Remote Control and Advanced Techniques Lesson 16.

Slides:



Advertisements
Similar presentations
Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Advertisements

Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Week 6-1 Week 6: Trojans and Backdoors What is a Trojan Horse? Overt and Covert.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
Remote Control and Advanced Techniques. Remote Control Software What do they do? Connect through dial-in and/or TCP/IP. Replicate remote screen on local.
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
Novell Netware 3.12 Functionality, Support, & Administration.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Chapter 9: Novell NetWare
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Remote Administration Remote Desktop Remote Desktop Gateway Remote Assistance Windows Remote Management Service Remote Server Administration Tools.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Hacking Windows and Windows Security Lesson 10. Windows 9X/Me/NT There are still some folks out there using Windows 95 and 98, ME, 2000, and NT. Remote.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
CHAPTER 9 Sniffing.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
TCOM Information Assurance Management Software Hacking.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
SCSC 455 Computer Security Chapter 3 User Security.
Computer Security By Duncan Hall.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Role Of Network IDS in Network Perimeter Defense.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Network Devices and Firewalls Lesson 14. It applies to our class…
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Ssh: secure shell.
Working at a Small-to-Medium Business or ISP – Chapter 8
Secure Software Confidentiality Integrity Data Security Authentication
Remote Control and Advanced Techniques
Lesson 16-Windows NT Security Issues
6. Application Software Security
Presentation transcript:

Remote Control and Advanced Techniques Lesson 16

Remote Control Software With global corporations, support personnel who can deal with computer problems may not always be on-site. They may use remote control software to allow them to provide support and maintenance from a central location. The problem is that the same software that can be used for useful purposes can be exploited, especially if misconfigured, by attackers to gain remote access and control of computers and networks. Some new trojans designed to perform the same sort of functions as legitimate remote controls SW.

Ports for some Remote Control SW SoftwareTCPUDP Citrix ICA pcAnywhere22, 5631, , 5632 ReachOut43188None Remotely Anywhere2000,2001None Remotely Possible/ ControlIT799, Timbuktu VNC5800, 5801…None 5900, 5901… Windows Term Server3389None Radmin4899None

Discovering RC Software If an attacker finds one of these ports answering, they will try to exploit. After default installation, many applications leave themselves open to accept connections from anywhere, possibly even without a username or password. The easiest way to test for these is to simply attempt to connect to one of these ports. Try enumeration techniques to obtain possible userids from which you can guess passwords

Some sensible countermeasures Enable Passwords on your system Too often this is left off, especially for dial up access where folks think “nobody knows about it, they would have to know the phone #.” Enforce Strong passwords If you’re going to use them, you might as well make them strong. Force Alternate Authentication You don’t have to rely on OS alone, can utilize additional authentication some packages provide Encrypt Session Traffic Limit Login Attempts Log Failed Attempts Lock Out Failed Users Change Default Listen Port

Virtual Network Computing Originally developed at AT&T Labs. Can be used with/by Windows, Linux, and Solaris platforms Obtainable from Has some vulnerabilities (big surprise) Brute forcing VNC passwords Weak passwords a possible problem as always Network eavesdropping By default, VNC does not use any sort of encryption after a user authenticates to the VNC server. Weak WinVNC password obfuscation Stores the server password in an obfuscated fashion that may allow an attacker to recover the cleartext server password.

Microsoft Terminal Server Terminal Server lets you deliver Windows-based applications, or the Windows desktop itself, to virtually any computing device—including those that cannot run Windows. When users run an application on Terminal Server, the application execution takes place on the server, and only keyboard, mouse and display information is transmitted over the network. Users see only their own individual sessions, which are managed transparently by the server operating system, and remain independent of any other client session. Windows 2000 Terminal Services remote administration mode is called "Remote Desktop for Administration" in Windows Server 2003, and has the ability to remote the actual console session of the server.

Terminal Server Attacks Locating Terminal Server easy, uses port Launch your own Terminal Server client then wait to be prompted for login ID/Password, normal attempts at guessing at this point. ProbeTS, TSEnum are tools that will cycle through identified subnet attempting to locate Terminal Server Some other attacks possible as well RegAPI.DLL buffer overflow Weak encryption that can lead to eavesdropping Some possible user privilege elevation attacks

Session Hijacking An attempt to “take over” an established session. Some tools that can aid in this endeavor: Hunt: first allows you to snoop, then insert commands into stream Best countermeasure: encryption. If a person can’t view the traffic/session, it is hard to insert commands.

Back Doors If an intruder gets into your system, count on them attempting to install some backdoors to allow them continued access, even if you find and eliminate their primary method. Finding and clearing these can be a laborious task Some common back doors: Rogue user accounts Startup files – even if you clean up, these can reinstall ways in Scheduled jobs – similar to startup files, these will execute in future and will reinstall ways in Remote Control program installation

Back Orifice and Netbus These both are very similar to some of the RC software packages (and are sometimes advertised in that fashion). Original BO ran on Win 9x, BO2K added NT/2000. NetBus, similar to BO, consists of two parts: a client- program ("netbus.exe") and a server-program often named: "patch.exe" (or "SysEdit.exe" with version 1.5x), which is the actual backdoor. Version 1.60 uses the TCP/UDP-Port # "12345" which can't be altered. From version 1.70 and higher the port can be configured. BO2K also added some stealth capabilities and ability to customize it thus making it harder to detect.

Remote Control Backdoor Port Numbers DefaultDefaultAltern. Backdoor TCPUDPPorts Remote.exe No NetcatAnyAnyYes Back OrificeNA31337Yes Back Orifice Yes NetBus12345NAYes Masters Paradise NAYes

Trojans “A Trojan horse is a program that purports to be a useful software tool, but it actually performs unintended (and often unauthorized) actions, or installs malicious or damaging software behind the scenes when launched.” Key to Trojans is that you have to have somebody on the system run the Trojan in order for it to do its nefarious task. Two implications for us When doing an assessment, does the organization we are working with have Trojans installed? Is the environment such that it is likely they could be? Can we use a Trojan to further our testing goals?

Whack-A-Mole An example of a program that installed NetBus server while allowing you to play a game. Figure pg. 581 McClure et al.

Secure Shell (SSH) Attacks SSH is a secure protocol used in place of programs such as telnet to conduct protected remote interactive communications. Pretty good tool, but is vulnerable to a couple things: Traffic analysis. Program exists that allows you to determine the length of a password or command sent. Man-in-the-middle attack. Requires that you be able to replace public key used by host and that you are able to control DNS.

Rootkits Once a system has been subverted, a rootkit is often one of the first things downloaded and installed. Generally will include Trojanized versions of common programs Back doors (as discussed previously) Sniffers System Log cleaners Imaging the system (creating mirror image of system volumes) also sometimes accomplished when access obtained. Useful in circumventing security tools that utilize system states or details such as checksums.

Social Engineering “Clueless User” vs. the Help Desk “Help Desk” vs. the Clueless User Countermeasures Limit data leakage through web sites, public databases, … Formulate a strict policy for internal and external technical support procedures Be paranoid about remote access Craft outbound firewall and router access controls just as carefully as inbound Use safely Educate employees on the basics of a secure environment (and on social engineering)

Summary What is the importance and significance of this material? Remote Control software is more prevalent and is a tremendous security concern. How does this topic fit into the subject of “Security Risk Analysis”? We need to know about the different packages that could be installed and that the organization we are testing might not know about.