Advanced Penetration testing

Slides:



Advertisements
Similar presentations
Man in the Middle Attack
Advertisements

Matthew Sullivan Information Assurance Student Group March 8, 2010.
©2009 Justin C. Klein Keane PHP Code Auditing Session 3 – Tools of the Trade & Crafting Malicious Input Justin C. Klein Keane
WebGoat & WebScarab “What is computer security for $1000 Alex?”
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Technical Training: DIR-615
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Advanced Networking for DVRs
Telnet/SSH: Connecting to Hosts Internet Technology1.
Course 201 – Administration, Content Inspection and SSL VPN
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Workshop 3 Web Application Security Li Weichao March
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
MIS Week 5 Site:
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Software Security Testing Vinay Srinivasan cell:
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CHAPTER 9 Sniffing.
Web Applications Testing By Jamie Rougvie Supported by.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
MIS Week 11 Site:
MIS Week 5 Site:
MIS Week 9 Site:
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
MIS Week 10 Site:
Intro to Ethical Hacking
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Penetration Testing: Concepts,Attacks and Defence Stratagies
Instructor Materials Chapter 5 Providing Network Services
Securing Your Web Application in Azure with a WAF
Configuring ALSMS Remote Navigation
WEB APPLICATION TESTING
Lab 2: Packet Capture & Traffic Analysis with Wireshark
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
World Wide Web policy.
Advanced Penetration testing
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
Intro to Ethical Hacking
6.6 Firewalls Packet Filter (=filtering router)
Intro to Ethical Hacking
Telnet/SSH Connecting to Hosts Internet Technology.
Advanced Penetration testing
Intro to Ethical Hacking
Advanced Penetration testing
Advanced Penetration testing
NETWORK SECURITY LAB Lab 8. Firewall and VPN.
Getting Started: Amazon AWS Account Creation
CGS 3175: Internet Applications Fall 2009
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
Advanced Penetration testing
Presentation transcript:

Advanced Penetration testing MIS 5212.001 Week 5/6 Site: http://community.mis.temple.edu/mis5212sec001sec701sp2018/

Tonight's Plan Ettercap WebGoat Ettercap Exercise Next Week MIS 5212.001

Reminders Assignment 1 is due Remember to post and comment on blog No Class next Two weeks. Next time we meet is March 17 First test will be published after Spring break (week of March 11) MIS 5212.001

Upcoming Cloud Meeting Cloud Security Alliance will be putting on a seminar at Temple When:  March 13, 2018 Time – 5 PM to 9 PM I will share more details when I have them MIS 5212.001

Man In The Middle Intercepting traffic Source: http://www.valencynetworks.com/articles/cyber-attacks-explained-man-in-the-middle-attack.html MIS 5212.001

ARP spoofing What is ARP? Address Resolution Protocol IP->MAC mapping Make machine(s) think that the IP address it is searching for is you. How it works: Broadcast and ask if anyone knows Response is typically from that IP or Flood with unsolicited responses

ARP spoofing (more) If 2 machines (real and fake) respond, effect depends on OS some OS overwrite earlier response other OS ignore unless it’s current entry expires Original can be disconnected by Power Wiring (connectivity)

Ettercap A tool for performing man in the middle attacks Pre-installed in Kali MIS 5212.001

Ettercap Attacks Ettercap supports active and passive dissection of many protocols (including ciphered ones). Ettercap offers four modes of operation: IP-based: packets are filtered based on IP source and destination. MAC-based: packets are filtered based on MAC address, useful for sniffing connections through a gateway. ARP-based: uses ARP poisoning to sniff on a switched LAN between two hosts (full-duplex). Public ARP-based: uses ARP poisoning to sniff on a switched LAN from a victim host to all other hosts (half-duplex). MIS 5212.001

Ettercap Other Features: Character injection SSH1 support: the sniffing of a username and password HTTPS support: the sniffing of HTTP SSL secured data—even remote traffic through a GRE tunnel Plug-in support Password collectors for: TELNET, FTP, POP, IMAP, rlogin, SSH1, ICQ, SMB, MySQL, HTTP, NNTP, X11, Napster, IRC, RIP, BGP, SOCKS 5, IMAP 4, VNC, LDAP, NFS, SNMP, Half-Life, Quake 3, MSN, YMSG Packet filtering/dropping OS fingerprinting Kill a connection Passive scanning of the LAN Hijacking of DNS requests MIS 5212.001

Ettercap After Launch: MIS 5212.001

Ettercap Click “Unified Sniffing” MIS 5212.001

Ettercap Select Your Network Connection (May not be same) MIS 5212.001

Ettercap Now we will see who is out there: MIS 5212.001

Ettercap Available Hosts, I’m going after the last one! MIS 5212.001

Ettercap Setup to ARP Poison MIS 5212.001

Problem Doesn’t Work in a VM You will need real machines on a switch to get this fully functioning A good walkthrough is http://www.thegeekstuff.com/2012/05/ettercap-tutorial/ MIS 5212.001

A Little About Browsers What is a Web Browser? Rendering Engine JavaScript Engine Network communications layer … May also include Add-Ins Browser Helper Objects APIs to/for other applications MIS 5212.001

A Little About Browsers Why are we talking about this? Browser are fairly complicated Browsers have many sub-components and features Browsers need to understand many different forms of character encoding All of this gives us something to work with when attacking Web Applications MIS 5212.001

Browser Internals Good references for details http://taligarsiel.com/Projects/howbrowserswork1.htm https://www.html5rocks.com/en/tutorials/internals/howbrowserswork/#Rendering_engines MIS 5212.001

The OWASP Top 10 OWASP Top 10 – 2017 (New) 2017-A1 – Injection 2017-A2 – Broken Authentication and Session Management 2017-A3 – Sensitive Data Exposure 2017-A4 – XML External Entities (XXE) 2017-A5 - Broken Access Control 2017-A6 – Security Misconfiguration 2017-A7 – Cross Site Scripting (XSS) 2017-A8 – Insecure Deserialization 2017-A9 – Using Known Vulnerable Components 2017-A10 – Insufficient Logging & Monitoring Source: https://www.owasp.org/index.php/Top_10-2017_Top_10

2017-A1 – Injection

2017-A2 – Broken Authentication and Session Management

2017-A3 – Sensitive Data Exposure

2017-A4 – XML External Entities (XXE)

2017-A5 - Broken Access Control

2017-A6 – Security Misconfiguration

2017-A7 – Cross Site Scripting (XSS)

2017-A8 – Insecure Deserialization

2017-A9 – Using Known Vulnerable Components

2017-A10 – Insufficient Logging & Monitoring

WebGoat WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons The current version is v8.0.0.M12, this is still a work in progress. WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. MIS 5212.001

WebWolf WebWolf is a completely separate web application which you **can** use to solve assignments. In the current version a couple of assignment/challenges use WebWolf. More details can be found in the WebWolf lesson inside WebWolf. MIS 5212.001

How to get WebGoat You can download WebGoat at: https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project https://github.com/WebGoat/WebGoat/releases You will also need Java >= 1.6 (JDK 1.7 Recommended) http://www.oracle.com/technetwork/java/javase/downloads/index.html MIS 5212.001

Windows Version MIS 5212.001

WebGoat Download Entering URL for WebGoat gives: Use the down arrow and select “Save As” to save file to the location of your choice. MIS 5212.001

Installing Java JRE Follow URL to: MIS 5212.001

Installing Java JRE Selecting “JRE” gives: MIS 5212.001

Installing Java JRE Click “Accept” and select the OS Same as WebGoat, use save as option to put the file where you want it Once downloaded, run the file and follow the prompts To launch in Windows, open the command line and type: Java –jar webgoat-server-8.0.0.M12.jar Command line will say busy and will look like it hangs at Initializing Spring …. MIS 5212.001

Verifying WebGoat is Up Open a browser and type the following in the URL bar: http://localhost:8080/WebGoat/ MIS 5212.001

Basic Use MIS 5212.001

Remember If the browser doesn’t appear to connect. Check “Intercept On” is turned of in Proxy MIS 5212.001

Linux Version Download the “jar” file as described on the earlier slide Java JRE is already installed in Kali Open a terminal and execute the same command Java –jar WebGoat-6.0.1-war-exec.jar Verify same as earlier slide MIS 5212.001

Now What If you downloaded the jar file to Kali, you are ready to launch the Intercepting Proxy, point the browser at the proxy and start If you want to work in Windows, you will need to get an intercepting proxy on to your windows machine Go to: http://portswigger.net/burp/ Select “Download” tab and then “Free” This will bring down another jar file for BurpSuite MIS 5212.001

Caution Once WebGoat is running, you are one of the most vulnerable systems on the internet! Once you have downloaded the files consider disconnecting from the network MIS 5212.001

What’s an Intercepting Proxy In this instance, an intercepting proxy is software that acts as a server and sits between the web browser and your internet connection Examples Burp Suite Webscarab Paros MIS 5211.001

In Kali 2.0 Or MIS 5212.001

Some Rules for Our Use of Intercepting Proxies For this course Monitor and record ONLY for external sites Do not inject or alter any traffic unless you personally own the web site. Like your personal copy of WebGoat MIS 5211.001

Burp Suite Start Burp Suite by logging in to Kali and selecting Burp Suite from: Kali Linux > Web Applications > Web Application Proxies > BurpSuite Kali 2.0 > Applications > Web Application Analysis > BurpSuite MIS 5211.001

Burp Suite MIS 5211.001

Getting Started Once BurpSuite is running, you will need to start and configure a browser Kali’s web browser is “Iceweasel”, an adaptation of Firefox After starting Iceweasel, navigate to preferences And select it MIS 5211.001

Configuring the Network Proxy Navigate to the Network Tab and select settings… for Connection MIS 5211.001

Configuring the Network Proxy Change selection from “Use system proxy settings” to “Manual proxy configuration and enter “127.0.0.1” for “HTTP Proxy” and “8080” for “Port” Or any other port number that works for you 8080 is used by WebGoat, so we should pick something else Also, select check box for “Use this proxy server for all protocols” Select “OK” when done Browser is now setup to use BurpSuite See next slide for example MIS 5211.001

Configuring the Network Proxy MIS 5211.001

Configuring BurpSuite MIS 5212.001

BurpSuite Should Look Like This MIS 5212.001

Should Look Like This MIS 5211.001

Now We Can Test In browser, navigate to google.com Browser will hang and look busy Select the “Proxy” tab in BurpSuite BurpSuite is waiting for you, select forward MIS 5211.001

Browser Knows Something is Up Select “I understand the Risks” and follow prompts to add an exception MIS 5211.001

Browser Knows Something is Up MIS 5211.001

Back to WebGoat MIS 5212.001

Landing Screen MIS 5212.001

WebGoat Exercises HTTP Basics (Just to get a feel of how WebGoat works) Injection Flaws SQL Injection Authentication Flaws Authentication Bypass Cross-Site Scripting Access Control Flaws Insecure Direct Object References Missing Function Level Access Control Insecure Communications Request Forgeries Client Side Client Side Filtering (Requires FireBug, now built in as DevTools) MIS 5212.001

Next Week No Class next Two weeks. Next time we meet is March 17 First test will be published after Spring break (week of March 11) Do WebGoat Exercises and Submit Screen Caps of Success as Evidence of Completion. MIS 5212.001

Ettercap Practical MIS 5212.001

Questions ? MIS 5212.001