Recon This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen C.

Slides:



Advertisements
Similar presentations
Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
Advertisements

Backdoors, Trojans and Rootkits CIS 413 This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited.
Intrusions. Disclaimer Some techniques and tools mentioned in this class could be: – Illegal to use – Dangerous for others – they can crash machines and.
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Computer Security and Penetration Testing
Network Security Testing Techniques Presented By:- Sachin Vador.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Chapter 5 Phase 1: Reconnaissance. Reconnaissance  Finding as much information about the target as possible before launching the first attack packet.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
Information Networking Security and Assurance Lab National Chung Cheng University COUNTER HACK Chapter 5 Reconnaissance Information Networking Security.
Reconnaissance Steps. EC-Council Gathering information from Open Sources  Owner of IP-address range  Address Range  Domain Names  Computing Platforms.
Computer Security and Penetration Testing
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Authorization and Policy. Is principal P permitted to perform action A on object O? – Authorization system will provide yes/no answer Authorization.
Networking Basics: DNS IP addresses are usually paired with more human-friendly names: Domain Name System (DNS). internet.rutgers.edu HostnameOrganizationTop-level.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Virtual Company Group 8 Presentation Date: June /04/2017
 Find out initial information ◦ Open Source ◦ Whois ◦ Nslookup  Find out address range of the network ◦ ARIN (American registry for internet numbers)
Information Gathering Lesson 4. Steps for Gathering Information Find out initial information Open Source Whois Nslookup Find out address range of the.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
CIS 450 – Network Security Chapter 3 – Information Gathering.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
1 Lab 1: Reconnaissance, Network Mapping, and Vulnerability Assessment Reconnaissance Scanning Network Mapping Port Scanning OS detection Vulnerability.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
TCOM Information Assurance Management Casing the Establishment.
Footprinting and Scanning
CS3695 – Network Vulnerability Assessment & Risk Mitigation – Supplemental Slides to Module #2 Footprinting and Reconnaissance Intelligence Gathering CEH.
4343 X2 – Outline The Domain Name System The Web.
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Web Server Administration Chapter 4 Name Resolution.
Footprinting. Traditional Hacking The traditional way to hack into a system the steps include: Footprint: Get a big picture of what the network is Scan.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
4343 X2 – The Application Layer Tanenbaum Chapter 7.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Footprinting and Scanning
The Internet.
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Internet Applications
Footprinting and Scanning
FootPrinting CS391.
Passive Research Section 2 11/29/2018.
INTERNET APPLICATIONS
Presentation transcript:

Recon This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen C. Hayne

Phase 1: Reconnaissance Investigate the target using publicly available information Use this information to plan your attack Use this information to plan your escape

Low-Tech Reconnaissance Social engineering Physical break-in Dumpster diving Eavesdropping Wiretapping

Lo-Tech: Social Engineering Still the best way to get information. The GIBE virus that claims to be a security fix from Microsoft is an example of this.GIBE virus Calls to help desk about passwords. Calls to users from “help desk” about passwords. Defense: user/sysadmin awareness

Lo-Tech: Physical Break-In Wiretaps into the wiring closets Drive up to a house, clip into their outside phone box with a long set of wires and dial anywhere using their phone. Remember this is highly illegal. Physical access to machine rooms or “secure” building under a variety of ruses. Defense: badge checks, education, alarms and motion sensors.

Lo-Tech: Physical Break-In Theft of laptops at airports Use encrypted file system Screen savers 5 minute minimum, password protected

Lo-Tech: Dumpster Diving Rummaging through the site’s trash looking for discarded information Credit card slips, password information, old network maps, old server configuration listings Oracle caught dumpster diving on Microsoft Defense: paper shredders, proper trash disposal

Web-based Reconnaissance Searching a company’s own website employee contact info with phone numbers clues about corporate culture and language business partners recent mergers and acquisitions technologies in use NT? IIS? Oracle? Solaris? helpful for social engineering attacks

Web-based Reconnaissance Using search engines search for “ all websites that link to that URL potential business partners, vendors, clients Forums (the virtual watering hole) newsgroups are asked technical questions by company employees attackers can... learn a company’s system mislead the employees

Web-based Reconnaissance Defenses establish a company policy on web-publication of sensitive information, especially about products used in the company and their configuration establish a company policy on employees’ use of newsgroups/forums and mailing lists surf newsgroups, etc. for sensitive info about your own company to see what has leaked out

The Domain Name System Hierarchical, highly distributed database IP addresses, domain names, mail-server info DNS servers : Internet :: 411 : phone system

whois Databases Domain names, network addresses, IT employees Registrars (100s) compete to register domains mom’n’pops to giants, barebones to value-added InterNIC whois db [ ] lists registrars for.com,.net,.org domains Allwhois whois db [ ] front-end for registrars in 59 countries Other whois dbs [ whois.nic.mil ], [ whois.nic.gov ], [ ] (for.edu domains)

ARIN IP Address Assignments American Registry for Internet Numbers (ARIN) maintains information on who owns IP address ranges given a company name. Scope: North and South America, Caribbean, sub-Saharan Africa

RIPE, APNIC Address Assignments Reseaux IP Europeens Network Coordination Centre (RIPE NCC) contains the IP address assignments for European networks. Asian assignments are at the Asia Pacific Network Information Center (APNIC)

We’ve Got the Registrar, Now What? Search at a particular registrar by... company name or human name ( name ) domain name (no keyword needed) IP address, host name or name server name ( host ) NIC handle ( handle ) Can learn... administrative, technical, and billing contact names phone nos., addresses, postal addresses registration dates name servers

Defenses against DNS-based Recon no OS in machine names & therefore DNS servers don’t include HINFO or TXT records for machines limit zone transfers to need-to-know IP addresses DNS needs UDP Port 53 to resolve names TCP Port 53 is used for zone transfers restrict it to known secondary DNS servers Split DNS a.k.a. Split-Brain a.k.a. Split-Horizon DNS external DNS server: publicly accessible hosts only internal DNS server: DNS info for internal network like proxy server; forwards requests beyond firewall

Interrogating DNS servers first identify a company “name/domain server” Windows & most UNIX flavors have: nslookup zone transfer: “send all info about a domain” system names (may imply OS, machines’ purposes) IP addresses, mail-server names, etc. most UNIXs flavors have: host some UNIXs flavors have: dig available for Windows : adig, nscan [ nscan.hypermart.net/index.cgi?index=dns ] General Purpose Reconnaissance Tools

Sam Spade [ ] Windows, GUI, freeware web browser, ping, whois, IP block whois, nslookup, dig, DNS zone transfer, traceroute, finger, SMTP VRFY CyberKit [ ] NetScanTools [ ] iNetTools [ ]

All traffic comes from web server, not client Attacker can remain more anonymous Some operated by... high-integrity pros in security organizations shady characters... so don’t use your company’s ISP account Some tests include DoS attacks... so check with your company’s legal department Web Reconnaissance Tools

Scanning Software Languard GFI (for Windows) NMAP (for Un*x)

Nessus: A Vulnerability Scanner for Linux Nessus is a free, open-source general vulnerability scanner As such, it is used by the white hat community and the black hats Project started by Renaud Deraison Available at Consists of a client and server, with modular plug-ins for individual tests