1 CAP6135: Malware and Software Vulnerability Analysis Reconnaissance.

Slides:



Advertisements
Similar presentations
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Advertisements

Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
Google Search Using internet search engine as a tool to find information related to creativity & innovation.
Ahmad Radaideh.  Abstract  Introduction  Google Cached Content  GOOGLE HACKING Procedures  Google Advance Operators  Google hacking Result Categories.
Introduction The Basic Google Hacking Techniques How to Protect your Websites.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Chapter Apache Installation in Linux- Mandrake. Acknowledgment The following information has been obtained directly from
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
IDK0040 Võrgurakendused I Building a site: Publicising Deniss Kumlander.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
Evaluating Web Server Log Analysis Tools David Strom SD’98 2/13/98.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
MIS Week 3 Site:
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
1 CSCD 434 Lecture 5 Winter 2013 Reconnaissance. 2 Attack Stages Turns out, different reasons attackers want to attack you – Altruistic reasons to sheer.
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
Wasim Rangoonwala ID# CS-460 Computer Security “Privacy is the claim of individuals, groups or institutions to determine for themselves when,
Lecturer: Ghadah Aldehim
DNS: Domain Name System
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
DNS Related Commands Sayed Ahmed Computer Engineering, BUET, Bangladesh (Graduated on 2001 ) MSc, Computer Science, U of Manitoba, Canada
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
CIS 450 – Network Security Chapter 3 – Information Gathering.
- prevents a search term to show in results for example searching for doughnut -cream can hel p you to avoid creamy doughnutsdoughnut -cream  “ “  using.
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
Web Searching Basics Dr. Dania Bilal IS 530 Fall 2009.
Searching the Web by Lorrie Brazier Revised by Paula Walton.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
MIS Week 3 Site:
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 3 1 Searching the Web Using Search Engines and Directories Effectively Tutorial.
Publishing Your Web Pages Ann Emmanuel SIUE Web Administrator
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Google This presentation is meant to be a handy tool to help you in your web searches. There is much more in Google than I present here but I hope this.
A presentation by Patrick Douglas Crispen NetSquirrel.com.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
CIW Lesson 6MBSH Mr. Schmidt1.  Define databases and database components  Explain relational database concepts  Define Web search engines and explain.
Footprinting and Scanning
Searching the Internet. What is the best search tool?
A presentation by Patrick Douglas Crispen NetSquirrel.com Modified 2013 by Michael Wood.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Google Hacking University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
©2003 Paula Matuszek GOOGLE API l Search requests: submit a query string and a set of parameters to the Google Web APIs service and receive in return a.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
Search Engine and Optimization 1. Introduction to Web Search Engines 2.
COMP1321 Digital Infrastructure Richard Henson March 2016.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Modern information gathering Dave van Stein 9 april 2009.
Google Hacking: Tame the internet Information Assurance Group 2011.
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Penetration Testing Reconnaissance
Footprinting and Scanning
Common Methods Used to Commit Computer Crimes
Intro to Ethical Hacking
Searching the Internet
Acknowledgement Main lecture slides are adapted from Eastern Washington University, CSCD 434: Network Security (Spring 2014) By Carol Taylor
Configuring Internet-related services
CSCD 434 Lecture 3 Spring 2019 Reconnaissance.
Presentation transcript:

1 CAP6135: Malware and Software Vulnerability Analysis Reconnaissance

2 Main lecture slides are adapted from Eastern Washington University, CSCD 434: Network Security (Spring 2014) By Carol Taylor "Google Hacking 101", by Matt Payne s/RC1.pdf s/RC1.pdf

3 Attack Stages 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Covering Tracks and Hiding Today, look at Reconnaissance...

4 Purpose of Reconnaissance What is the purpose of reconnaissance? Find out information about target(s)‏ – More experienced attackers invest time and resources in information discovery – Like bank robbers Do they just decide one day to rob a bank? No. At least successful ones Research vaults, locks, address of bank and map an escape route – Computer Attack – no different

5 Attack Reconnaissance Sources – Low Technology Social Engineering Physical Reconnaissance Dumpster Diving

6 Attack Reconnaissance Social Engineering – Employees give away sensitive information – Most successful are calls to employees Call help desk as “new” employee for help with a particular task Angry manager calls lower level employee because password has suddenly stopped working System administrator calls employee to fix her account... requires using her password

7 Social Engineering Social engineering works, because it exploits human vulnerabilities – Desire to help – Hope for a reward – Fear of making a mistake – Fear of getting in trouble – Fear of getting someone else in trouble

8 Social Engineering is Easy Compare Social Engineering vs. Traditional way to obtain user password Assume already have user name, Ex. ctaylor Got it from Web site, news or forum group Traditional Steps 1. Scan network to see if ports are open 2. Assume you got an open port and machine didn't have latest patches, installed a rootkit onto victim network 3. Enumerate the network, looking for a password file May be large number of subnets and hosts

9 Social Engineering is Easy 4. Locate and copy encrypted password file Need to dump password file to your server to process the file Remain stealth the entire time, modifying logs, altering registry keys to conceal when files were accessed 5. Run cracking tools against encrypted file In privacy of own network, John the Ripper or Cain and Able will crack the file – Takes about a week...

10 Social Engineering is Easy Compare Social Engineering vs. Traditional way to obtain user password – Same goals but with Social Engineering 1. Make a phone call 2. Make another phone call, while you are chatting, ask for and receive logon credentials May be able to do it in one step, if lucky!!

11 Defense for Social Engineering User Awareness Train them to not give out sensitive information Security awareness program should inform employees about social engineering attacks No reason why a system administrator ever needs you to give him/her your password Help desk should have a way to verify the identify of any user requesting help Other ideas?

12 Technical Attack Reconnaissance

13 Domain Names – Registration process provides Guarantee of unique name Enter name in Whois and DNS Databases – Registrars Before 1999, one registrar, Network Solutions Now, thousands of registrars compete for clients complete list of registrars

14 Domain Names Internet Network Information Center – Search for domain name’s registrar – Comes back with registrar and other information

15 Internic.net/whois.html phptr.com

16 Example from Internic.net/whois phptr.com

17 Example Whois Query Tryit, Lets enter counterhack.net Answer is Domain Name: COUNTERHACK.NET Registrar: NETWORK SOLUTIONS, LLC Whois Server: whois.networksolutions.com Referral URL: Name Server: NS1.NETFIRMS.COM Name Server: NS2.NETFIRMS.COM Status: clientTransferProhibited Updated Date: 21-jun-2006 Creation Date: 22-jun-2001 Expiration Date: 22-jun-2008

18 Attack Reconnaissance Whois DB’s – For other countries, use – Military sites, use – Education, use

19 Attack Reconnaissance Details from the Whois DB – After obtaining the target’s registrar, attacker can obtain detailed records on target from whois entries at registrar's site – Can look up information by Company name Domain name IP address Human contact Host or server name

20 Attack Reconnaissance Details from the Whois DB If only know Company’s name Whois DB will provide lot more information – Human contacts – Phone numbers – addresses – Postal address – Name servers – the DNS servers Network Solutions

21 Counterhack.net Registrant: Skoudis, Edward 417 5TH AVE FL 11 NEW YORK, NY US Domain Name: COUNTERHACK.NET Administrative Contact : Skoudis, Edward 417 5TH AVE FL 11 NEW YORK, NY US Phone:

22 Counterhack.net.. Old Data Technical Contact : Network Solutions, LLC Sunrise Valley Drive Herndon, VA 20171, US Phone: Fax: Record expires on 22-Jun-2008 Record created on 22-Jun-2001 Database last updated on 21-Jun-2006 Domain servers in listed order: NS1.NETFIRMS.COM NS2.NETFIRMS.COM

23 Attack Reconnaissance ARIN DB In addition to the Whois DB, another source of information is the American Registry for Internet Numbers (ARIN)‏ ARIN maintains Web-accessible, whois-style DB lets users gather information about who owns particular IP address ranges Can look up IP’s in North and South America, Caribbean and sub-Saharan Africa Use: Then, type in IP address at the whois prompt In Europe use, Re’seaux IP Euorope’ens Network Coordination Centr (RIPE NCC)

24 Attack Recon Whois command – Or, instead of going to the Internet, you can just type whois from the command line of Linux – If the port number is not blocked!!! $ whois counterhack.net This will display all of the information available from the public dns records for that domain

25 Attack Reconnaissance Domain Name System (DNS)‏ – DNS is a worldwide hierarchical DB – Already said... Organizations must have DNS records for their systems associated with a domain’s name Using DNS records, attacker can compile a list of systems for attack Can even discover Operating System

26 2: Application Layer2: Application Layer DNS records DNS: distributed db storing Resource Records (RR) Type=NS name is domain (e.g. foo.com) value is name of authoritative DNS server for this domain RR format: (name, value, type, ttl) r Type=A  name is hostname  value is IP address r Type=CNAME  name is alias name for some “canonical” (the real) name is really servereast.backup2.ibm.com  value is canonical name r Type=MX  value is name of mailserver associated with name

27 Attack Reconnaissance Querying DNS – First, find out one or more DNS servers for a target system – Available from records gathered from the Whois DB Listed as “name servers” and “domain servers” One common tool used to query DNS servers is the nslookup command Included in all Unix flavors and Win NT/2000/XP

28 Attack Reconnaissance DNS Query First try to do a Zone transfer – Says “give me all the information about systems associated with this domain” – First use a server command to set DNS server to target’s DNS server – Then set the query up to retrieve any type of information – And finally to do the zone transfer

29 Attack Reconnaissance DNS Query Dig command – dig – Unix variations must use this for Linux $ counterhack.net -t AXFR This does a zone transfer... might not work Excellent reference for dig here

30 Attack Reconnaissance Defence against DNS Queries Restrict Zone Transfers – Only reason you allow Zone transfers is to keep secondary DNS server in sync with primary server – Configure DNS server to only allow Zone transfers to specific IP Addresses – Can also configure Firewalls or router to restrict access to TCP/UDP port 53 to back-up DNS server

31 Attack Reconnaissance General Purpose Reconnaissance Tools – Can also research target through attack portals on the web – Sites allow you to do research and even initiate an attack against the target

32 Google Hacking Basics

33 Google Hacking Good to understand how Google works – Understand then how Google can work for attackers to gain sensitive information – And, how you can defend against this type of information gathering

34 Google Basics Several components to Google – Google Bots Crawl web sites and search for information – Google Index Massive index of web pages – index is what gets searched. Relates pages to each other – Google Cache Copy of 101K of text for each page Even deleted pages still have copies in Google cache – Google API Programs perform search and retrieve results using XML Uses SOAP Simple Object Access Protocol – Need your own Google API key to use Google API

35 Google Basics Can use directives to focus search and limit amount of information returned – site:counterhack.net Says to search only in counterhack.net – filetype:ppt site:counterhack.net Limits file type to power point for counterhack.net site – cache: Good for removed pages Combining terms gives powerful searches – site:wellsfargo.com filetype:xls ssn Says to search only Wellsfargo site for spreadsheets with ssn – social security number

36 Google Basics If Web page removed – May still be in Google Cache – Another place for removed web pages Wayback Machine Archives old web pages Can search for active scripts – site:wellsfargo.com filetype:asp – site:wellsfargo.com filetype:cgi – site:wellsfargo.com filetype:php

3737 Google Bombing != Google Hacking A Google bomb or Google wash is an attempt to influence the ranking of a given site in results returned by the Google search engine. Due to the way that Google's Page Rank algorithm works, a website will be ranked higher if the sites that link to that page all use consistent anchor text.

3838 How Do I Get Google Search Results? Pick your keywords carefully & be specific Do NOT exceed 10 keywords Use Boolean modifiers Use advanced operators Google ignores some words*: a, about, an, and, are, as, at, be, by, from, how, i, in, is, it, of, on, or, that, the, this, to, we, what, when, where, which, with *From: Google 201, Advanced Googology - Patrick Crispen, CSU

3939 Google's Boolean Modifiers AND is always implied. OR: Escobar (Narcotics OR Cocaine) "-" = NOT: Escobar -Pablo "+" = MUST: Escobar +Roberto Use quotes for exact phrase matching: "nobody puts baby in a corner"

4040 Wildcards Google supports word wildcards but NOT stemming. "It's the end of the * as we know it" works. but "American Psycho*" won't get you decent results on American Psychology or American Psychophysics.

4141 Advanced Searching googleguide.com and… Advanced Search Page:

4242 Advanced Operators cache: define: info: intext: intitle: inurl: link: related: stocks: filetype: numrange: source: phonebook: and DEMO: on visa

43

4444 Review: Basic Search Use the plus sign (+) to force a search for an overly common word. Use the minus sign (-) to exclude a term from a search. No space follows these signs. To search for a phrase, supply the phrase surrounded by double quotes (" "). A period (.) serves as a single-character wildcard. An asterisk (*) represents any word—not the completion of a word, as is traditionally used.

4545 Advanced Operators Google advanced operators help refine searches. Advanced operators use a syntax such as the following: operator:search_term Notice that there's no space between the operator, the colon, and the search term. The site: operator instructs Google to restrict a search to a specific web site or domain. The web site to search must be supplied after the colon. The link: operator instructs Google to search within hyperlinks for a search term. The cache: operator displays the version of a web page as it appeared when Google crawled the site. The URL of the site must be supplied after the colon. Turn off images and you can look at pages without being logged on the server! Google as a mirror.

4646 Other parts Google searches not only the content of a page, but the title and URL as well. The intitle: operator instructs Google to search for a term within the title of a document. The inurl: operator instructs Google to search only within the URL (web address) of a document. The search term must follow the colon. To find every web page Google has crawled for a specific site, use the site: operator.

4747 What Can Google Search? The filetype: operator instructs Google to search only within the text of a particular type of file. The file type to search must be supplied after the colon. Don't include a period before the file extension. Everything listed at claims Johnny. Can also,e.g., say filetype:phps to only search.phps files. filetype:phps mysql_connect Adobe Portable Document Format (pdf) Adobe PostScript (ps) Lotus (wk1, wk2, wk3, wk4, wk5, wki, wks, wku) MacWrite (mw) Microsoft Excel (xls) Microsoft PowerPoint (ppt) Microsoft Word (doc) Microsoft Works (wks, wps, wdb) Microsoft Write (wri) Rich Text Format (rtf) Shockwave Flash (swf) Text (ans, txt) And many more….

4848 Directory Listings Show server version information Useful for an attacker intitle:index.of server.at intitle:index.of server.at site:aol.com Finding Directory Listings intitle:index.of "parent directory" intitle:index.of name size Displaying variables “Standard” demo and debugging program “HTTP_USER_AGENT=Googlebot” Frequently an avenue for remote code execution /etc/passwd`

4949 Default Pages Default Pages are another way to find specific versions of server software…. Apache Server VersionQuery Apache 1.3.0–1.3.9 Intitle:Test.Page.for.Apache It.worked! this.web.site! Apache1.3.11–1.3.26Intitle:Test.Page.for.Apache seeing.this.instead Apache 2.0Intitle:Simple.page.for.Apache Apache.Hook.Functions Apache SSL/TLSIntitle:test.page "Hey, it worked !" "SSL/TLS-aware" Many IIS serversintitle:welcome.to intitle:internet IIS Unknown IIS serverintitle:"Under construction" "does not currently have" IIS 4.0intitle:welcome.to.IIS.4.0 IIS 4.0allintitle:Welcome to Windows NT 4.0 Option Pack IIS 4.0allintitle:Welcome to Internet Information Server IIS 5.0allintitle:Welcome to Windows 2000 Internet Services IIS 6.0allintitle:Welcome to Windows XP Server Internet Services Many Netscape serversallintitle:Netscape Enterprise Server Home Page Unknown Netscape serverallintitle:Netscape FastTrack Server Home Page

5050 Security Advisory + Source = Google Hack Security Advisories and application patches for web application explain the newly discovered vulnerability Analysis of the source code of the vulnerable application yields a search for un-patched applications Sometimes this can be very simple; e.g.: “Powered by CuteNews v1.3.1”

5151 Automation! There are two ways to automate Google searches: Plain old web robots The Google API:

5252 Terms of Service "You may not send automated queries of any sort to Google's system without express permission in advance from Google. Note that 'sending automated queries' includes, among other things: using any software which sends queries to Google to determine how a web site or web page 'ranks' on Google for various queries; 'meta-searching' Google; and performing 'offline' searches on Google."

5353 Google API The Google API is the blessed way of automating Google interaction. When you use the Google API you include your license string

5454 Protecting Yourself from Google Hackers Keep your sensitive data off the web! Even if you think you're only putting your data on a web site temporarily, there's a good chance that you'll either forget about it, or that a web crawler might find it. Consider more secure ways of sharing sensitive data, such as SSH/SCP or encrypted .

5555 Protecting yourself… Consider removing your site from Google's index.

5656 Robots.txt Use a robots.txt file. Web crawlers are supposed to follow the robots exclusion standard. This standard outlines the procedure for "politely requesting" that web crawlers ignore all or part of your web site. This file is only a suggestion. The major search engine's crawlers honor this file and its contents. For examples and suggestions for using a robots.txt file, see exclusion standard

57 Google Hacking – Something called – The Google Hacking Database (GHDB) Database of saved queries that identify sensitive data – Google blocks some better known Google hacking queries, nothing stops hacker from crawling your site and launching “Google Hacking Database” queries directly

58 Google Hacking Originally, Google Hacking Database located at Created by Johnny Long, a security “expert” – More information about Google hacking can be found: l=1

59 Google Hacking Now, Google Hacking DB is at different URL – – Johnny I hackstuff is off doing charitable work in Uganda – Being maintained by the Exploit DB people

60 Google Hacking What Can a hacker can learn from Google queries? Information Google Hacking Database identifies: – Advisories and server vulnerabilities – Error messages that contain too much information – Files containing passwords – Sensitive directories – Pages containing logon portals – Pages containing network or vulnerability data such as firewall logs

61 Defenses from Google Hacking Check your site for Google hacking vulnerabilities – The easiest way to check whether web site/applications have Google hacking vulnerabilities Use a Web Vulnerability Scanner – Web Vulnerability Scanner scans your entire website and automatically checks for pages identified by Google hacking queries. Note: Your web vulnerability scanner must be able to launch Google hacking queries – Ex: Acunetix Web Vulnerability Scanner

62 Defenses from Google Hacking If Google has cached a page or URL – Can have Google remove it – First, update your Web site and remove sensitive information – Then signal Google not to index or cache it Put a file, robots.txt in Web Server directory Says don’t search certain directories, files or entire Web site

63 Defenses Against Google Hacking Or, keep Google from accessing your pages with meta tags at top of Web pages – noindex, nofollow, noarchive and others Tells Google not to index, link or archive page Can also request directly from Google – Does the request in 24 hours or less Remove page from other places for non-Google search engines for Wayback Machine

64 Attack Reconnaissance Summary – At the end of this phase the attacker has information needed to move on to the next phase Scanning – At a minimum have Phone number List of IPs Address and domain name Lucky – has Operating System and Server names