Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.

Slides:



Advertisements
Similar presentations
Safer, Speedier and Sexier Surfing with Safari. Which Web Browser?
Advertisements

©2009 Justin C. Klein Keane PHP Code Auditing Session 3 – Tools of the Trade & Crafting Malicious Input Justin C. Klein Keane
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
For Removal Info: visit
Unauthorized Reproduction Prohibited SkyPoint Alarm Integration Add-On Using OnGuard Alarms to create events in SkyPoint Also called ‘SkyPoint V0’ CR4400.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
MIS Week 3 Site:
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Introduction to Application Penetration Testing
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Reading Data in Web Pages tMyn1 Reading Data in Web Pages A very common application of PHP is to have an HTML form gather information from a website's.
Installing the SAFARIODBC.EXE For use with Excel May 3, 2002.
MIS Week 5 Site:
bWAPP – Bee Bug – Installation
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
Chapter 8 Collecting Data with Forms. Chapter 8 Lessons Introduction 1.Plan and create a form 2.Edit and format a form 3.Work with form objects 4.Test.
XHTML & Forms. PHP and the WWW PHP and HTML forms – Forms are the main way users can interact with your PHP scrip Typical usage of the form tag in HTML.
Web Applications Testing By Jamie Rougvie Supported by.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
MIS Week 5 Site:
Web Applications Attacks A: SQL Injection Stored Cross Site Scripting Prof. Reuven Aviv Department of Computer Science Tel Hai Academic College Topics.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
Final Project: Advanced Security Blade IPS and DLP blades.
COM621: Advanced Interactive Web Development Lecture 10 PHP and MySQL.
Penetration Testing Exploiting I: Password Cracking
2nd year Computer Science & Engineer
Virtual Machine and VirtualBox
Penetration Testing Reconnaissance 2
Traffic Analysis– Wireshark Simple Example
Intro to Ethical Hacking
SCRIPT RECORDING [webc mode].
Penetration Testing Scanning
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Tonga Institute of Higher Education IT 141: Information Systems
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
Introduction to working with Weebly
WEB APPLICATION TESTING
Penetration Testing Offline Password Cracking
NetApp Online Ordering User Tutorial
Penetration Testing Karen Miller.
Chapter 19 PHP Part III Credits: Parts of the slides are based on slides created by textbook authors, P.J. Deitel and H. M. Deitel by Prentice Hall ©
Intro to Ethical Hacking
Advanced Penetration testing
Intro to Ethical Hacking
Tonga Institute of Higher Education IT 141: Information Systems
Lecture 2 - SQL Injection
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Traffic Analysis– Wireshark Simple Example
Web Hacking: Beginners
Tonga Institute of Higher Education IT 141: Information Systems
Virtual Machine and VirtualBox
RefWorks Presented by Suzanne van den Hoogen
Acknowledgement Content from the book:
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
Virtual Machine and VirtualBox
Virtual Machine and VirtualBox
Complete exercise 8-11 in the workbook.
Presentation transcript:

Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida

Acknowledgement Some contents are from the book: “The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy”, Second Edition

SET: Social Engineering Attack Kali Linux has a toolset for social engineering attack Similar to Metasploit toolkit in term of comprehensiveness A good webpage tutorial: http://www.fixedbyvonnie.com/2015/06/using-the-social-engineering-toolkit-in- kali-linux/ A good YouTube video tutorial: https://www.youtube.com/watch?v=Iw-HrQ4DP0E

SET: Social Engineering Attack root@Kali~# setoolkit Select 1, social engineering attack

SET: Social Engineering Attack We first focus on website attack where SET clones a fake webserver with ‘credential haverster attack’ to obtain victim’s login credential    Put attack’s machine IP address here for setting malicious fake webserver

SET: Social Engineering Attack Put target webserver’s URL here for clone Then, a user who connects to http://192.168.0.114 might think He is connecting to the real facebook.com! And his login input will pass To the attacker’s machine!

SET: Social Engineering Attack If a user inputs his facebook.com account information in the fake website, the login information (by HTTP POST method) will be recorded down by SET! When I input username: czou@cs.ucf.edu and password: cnt5410l in the webpage, On the Kali Linux:

SET for Web Server Attack Besides credential harversting, SET can set up malicious web server for drive-by download attack: Put attack’s IP address here for fake webserver

SET for Web Server Attack Now the malicious webserver is up and running On victim’s IE browser, facebook.com shows up with Java Applet warning:

Basic of Web Hacking Analyze response from webserver and inspect for vulnerabilities: Web Server vulnerability scanner Intercept request as they leave your browser by using intercepting web proxy Find all the web pages, directories, and other files that make the web appliation: Clone Find secrete information

Nikto: Web Server Vulnerability Scanner Type the program: Kali# nikto

Nikto: Web Server Vulnerability Scanner -h: target name or IP -p: port number to scan -p 80, 443; -p 1-1000 OSVDB-xxx: google to find detail of each Attention: Do not try Nikto to sensitive web servers! It generates a flood of web probing traffic

webscarab: Web Spider and Interceptor root@Kali~# webscarab Configure Kali browser to use webscarab as proxy It serves as a proxy that intercepts and allows people to alter web browser web requests (both HTTP and HTTPS) and web server replies. [from Wikipedia] A youtube tutorial: https://www.youtube.com/watch?v=W5ppj2LnHXM

webscarab: Web Spider and Interceptor Configure Kali browser to use webscarab as proxy Configure Iceweasel’s Preference  Advanced  Network  Connection Setting… Be sure to remove entries under the “No Proxy” box! In this way, webscarab is a powerful web traffic monitoring and interceptor

webscarab: Web Spider and Interceptor Connect to the targeted web server once Right click the URL on Webscarab’s summary, then click “Spider Tree” will spider the web server

webscarab: Request/Response Interceptor You can intercept some requests, modify them before they are sent to the server. Choose “Proxy” tab, choose the "Manual Edit" tab. Once you click the "Intercept Requests" checkbox, you can choose which request methods you wish to intercept (most commonly GET or POST)

webscarab: Request/Response Interceptor Go back Kali browser and click a link, it will be intercepted and webscarab shows the following window You can now edit any part of the request field. you uncheck the "Intercept requests" checkbox, either in the intercept conversation window, or in the "Manual Edit" tab of the Proxy plugin.

Owasp-zap: Bringing it all together under one roof Owasp-zap contains all web-based hacking toolkit: Intercepting proxy, sipdering, web vulnerability scanning root@kali:~# owasp-zap

Owasp-zap Web vulnerability scanning Input target web URL under the “quick start” panel Make sure you are given permission to scan the target webserver! Here we scan the metasploitable Linux VM

Owasp-zap Web vulnerability scanning But it takes LONG LONG time! All scanning results will be housed in the “Alerts” tab for easy review

Owasp-zap Set as Browser Proxy For web traffic intercepting/modification, we first need to add zap as the browser proxy Similar to webscarab, but the port number is 8080 instead of 8008

Owasp-zap Spidering a website: right click a target URL  “Attack”  “Spider..”

Owasp-zap Maybe most useful: Request/Response Intercepting Check and see if a website can securely handle abnormal inputs What would the website do if I tried to order “-5” TV? What would the website do if I tried to get $2000 TV for $20? What if I sign in without providing username or password variables? Step 1: set break point for outgoing/incoming web traffic Step 2: Use the browser to visit the target website, the owasp- zap will pop up with the HTTP GET request shown up The web browser will hang there waiting for the Zap to continue to send request out Set break point

Owasp-zap Step 2: Use the browser to visit the target website, the owasp- zap will pop up with the HTTP GET request shown up The web browser will hang there waiting for the Zap to continue to send request out Step 3: Modify the Request content, then click “continue” The modified Request content will be sent to the target website.

WebGoat: A Vulnerable Platform for Web-based Attack Training Concept is similar to Metasploitable Linux VM Developed by OWASP organization Built on top of J2EE, can be run on any OS Download the “Easy Run” code from: https://github.com/WebGoat/WebGoat/wiki/Running-WebGoat root@kali:~/Downloads# java -jar webgoat-container-7.1- exec.jar In Kali Browser, type in URL: http://localhost:8080/WebGoat The webserver runs on 8080 port

Pre-Knowledge for SQL injection Attack Lesson in WebGoat Webpage account login: Username: czou Password: *********

Pre-Knowledge for SQL injection Attack Lesson in WebGoat Backend database: $result = mysql_query( “SELECT * FROM Accounts”. “WHERE Username = ’$username’”. “AND Password = ’$password’;”); if (mysql_num_rows($result)>0) $login = true;

Pre-Knowledge for SQL injection Attack Lesson in WebGoat Webpage account login: Username: czou’ OR 1=1;/* Password: *********

Resulting SQL query SELECT * FROM Accounts WHERE Username = ’czou’ OR 1=1;/*’ AND Password = ’*******’;

Resulting SQL query SELECT * FROM Accounts WHERE Username = ’czou’ OR 1=1; /*’ AND Password = ’*******’; No password is checked!

SQL injection Vulnerability: any application in any programming language that connects to SQL database The common theme to injection attacks: Concatenate strings Interpret the result strings Actions according to contained commands

WebGoat Example: Lab SQL Injection: Stage 1: String SQL Injection Let us do the Lab SQL injection (Stage 1) For this, we need to input special password: ‘ or ‘1’=‘1 But, the password field cannot support so many characters!

WebGoat Example: Lab SQL Injection: Stage 1 Solution: use owasp-zap web interceptor One issue, owasp-zap uses the same 8080 port as WebGoat Solution: Change the default port of Zap Select Zap menu “tools”  “option..”  “local proxy” Set up the Kali browser to use proxy on the modified port Remember to remove “no proxy on localhost” option A youtube video tutorial (non-English): https://www.youtube.com/watch?v=qb8F6SgsIrY

WebGoat Example: Lab SQL Injection: Stage 1 After your browser shows the password input page, Enable “Break point” on all request/response on owasp-zap Click webGoat login button, request will be intercepted On the intercept pop-up page, select “Table (adv)” option for head field, then the SQL fields will show up Now you can modify the password field with arbitrary text you want! After modification, click the “continue” button to send out the request