Hacking Exposed 7 Network Security Secrets & Solutions

Slides:



Advertisements
Similar presentations
Expose the Vulnerability Paul Hogan Ward Solutions.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 2 Scanning 1.
System Security Scanning and Discovery Chapter 14.
Vulnerability Analysis Borrowed from the CLICS group.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Computer Security and Penetration Testing
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Hacking Web Server Defiana Arnaldy, M.Si
Hacking Unix/Linux.
How does it differ from footprinting and scanning? – Footprinting did not necessarily attempt to access the target system(s) directly – Scanning involved.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Enumerating slides (c) 2012 by Richard Newman based on Hacking Exposed 7 by McClure, Scambray, and Kurtz.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
Enumerating slides (c) 2012 by Richard Newman based on Hacking Exposed 7 by McClure, Scambray, and Kurtz.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Ana Chanaba Robert Huylo
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Hands-On Ethical Hacking and Network Defense
Chapter 3 Enumeration Last modified
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
CS391 Computer & Network Security
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
1 Welcome to CSC 301 Web Programming Charles Frank.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Chapter 3 Enumeration Last modified Definition Scanning identifies live hosts and running services Enumeration probes the identified services.
1 Lab 1: Reconnaissance, Network Mapping, and Vulnerability Assessment Reconnaissance Scanning Network Mapping Port Scanning OS detection Vulnerability.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Enumeration After scanning for live systems and services, hackers will probe the services more carefully looking for weaknesses This involves active connections!
TCOM Information Assurance Management System Hacking.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Announcements RSA Security Conference (extra credit) RSA Security Conference (extra credit) –April 7 through April 11, San Francisco –Visit the Forum for.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
Footprinting and Scanning
CS3695/M6-109 – Network Vulnerability Assessment & Risk Mitigation–
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
CITA 352 Chapter 6 Enumeration.
Enumeration.
Working at a Small-to-Medium Business or ISP – Chapter 8
Footprinting and Scanning
Network Wiring and Reference
Hacking Unix/Linux.
Presentation transcript:

Hacking Exposed 7 Network Security Secrets & Solutions Chapter 3 Enumeration

Enumeration Service fingerprinting Vulnerability scanners Basic banner grabbing Enumerating common network services

Prelude Scanning vs. enumeration Enumerated info Level of intrusiveness Enumeration: active connections to systems and directed queries Generic : banner grabbing Platform-specific: dependent on port scans and OS detection Enumerated info User account names Misconfigured shared files Older software versions with known vulnerabilities Common services with fruitful enumerated info ftp (21), telnet (23), smtp (25), etc. Binding from ports, services, protocols, to software

Service Fingerprinting Revision/patch level with service ports Manual vs. automatic Stealth vs. efficiency Nmap version scanning nmap-services (mapping ports to services) vs. nmap-service-probe (known service responses  known protocol and version) Hidden services: e.g. Timbuktu vs. OpenSSH (on TCP port 1417) Amap version scanning Second opinion to Nmap Another service pattern-matching technique

Vulnerability Scanners Database of known vulnerability signatures Free scanners (Nessus, OpenVAS - Open Vulnerability Assessment System) vs. commercial ones from McAfee, Qualys, Rapid7, nCircule, Tenable Nessus by Tenable Exhaustive scanning Custom plug-ins using Nessus Attack Scripting Language (NASL) Free and open source till version 3 (proprietary closed source) Nessus scanning countermeasures Effective patch and configuration management IDS/IPS: alert on Nessus behaviors, slow scans down to redirect hackers to softer targets Nmap vs. Nessus Wider (not as powerful in vulnerability scanning) vs. focused Nmap Scripting Engine (NSE) A library of NSE scripts Network discovery, version detection, backdoor detection, exploitation of vulnerabilities

Basic Banner Grabbing Banners in the responses to requests Manual telnet Generic to work on many common applications on standard ports, e.g. HTTP (80), SMTP (25), FTP (21) Automatic netcat or nc Redirect an input file of requests to nc To grab more outputs in responses Vendor and version of software  known vulnerabilities Banner grabbing countermeasures Shut down unnecessary services Access control lists Try to disable the presentation of vendor and version in the banners

Enumerating Common Network Services (1/5) FTP on TCP 21 Still popular for Web content uploading Public sites (listed in ftp-sites.org) often configured for anonymous access for sensitive contents FTP enumeration countermeasures Use secure FTP (SFTP with SSH encryption) or FTP secure (FTPS with SSL) Watch out anonymous FTP, disallow unrestricted uploading Use HTTP instead to offer public content Telnet on TCP 23 Transmit data in cleartext: sniffed easily Still commonly available, being replaced by secure shell (SSH) System enumeration: display a system banner prior to login: host’s OS and version, or vendor, explicitly or implicitly Account enumeration: attempt login with a particular user and observe error messages Valid/invalid username & invalid password  a list of valid accounts Telnet enumeration countermeasures Use SSH if possible Modify banner info Reconnect between failed login attempts

Enumerating Common Network Services (2/5) SMTP on TCP 25 User enumeration by two built-in commands VRFY: confirms valid user names EXPN: reveals actual delivery addresses of aliases and lists By telnet or netcat, or an automatic tool vrfy.pl SMTP enumeration countermeasures VRFY & EXPN: disable or require authentication DNS on TCP/UDP 53 Normally on UDP 53; TCP 53 for zone transfer DNS enumeration by zone transfer on misconfigured DSN servers: dump entire zone files (A and HINFO records) nslookup, ls –d , <domainname>; or dig BIND enumeration: dig to get version.bind DNS cache snooping: dig +norecurse to request DNS server to query only its cache  deduce if a client has visited a particular site Automatic DNS enumeration: dnsenum & fierce.pl Domains  servers, subdomains, IP addresses CentralOps.net hosts web-based tools for attackers to stay hidden DNS enumeration countermeasures Block zone transfers (to authorized machines only), block BIND version.bind requests, disable DNS cache-snooping

Enumerating Common Network Services (3/5) TFTP on UDP 69 Trivial FTP: UDP-based, unauthenticated, quick & dirty, have to know the file name To grab a poorly secured /etc/passwd: tftp (connect, get) To access router/switch configurations: look for config TFTP enumeration countermeasures Inherently insecure Don’t run it; or wrap it to restrict and log access with TCP wrappers, limit access to /tftpboot, block at firewall Finger on TCP/UDP 79 Name, idle time of logged-on users Finger enumeration countermeasures Don’t run finger (comment out in inetd.conf, killall –HUP inetd); block port 79 at firewall, use TCP wrappers

Enumerating Common Network Services (4/5) HTTP on TCP 80 telnet & netcat (nc): to get banner info For SSL-enabled website Redirect to SSL proxy (sslproxy) or use SSL client (openssl) Automatic tool: Grendel-Scan Look for comments, robots.txt file, directories, etc. HTTP enumeration countermeasures Change the banner info Server vendor dependent

Enumerating Common Network Services (5/5) Other services Microsoft RPC endpoint mapper on TCP 135: epdump, rpcdump.py NetBIOS name service on UDP 137: net view, nltest, nbtstat, nbtscan, nmbscan NetBIOS session on TCP 139/445: net use, net view SNMP on UDP 161: snmputil, snmpget, snmpwalk BGP on TCP 179: telnet LDAP on TCP/UDP 389/3268: Active Directory Administration Tool UNIX RPC on TCP/UDP 111/32771: rpcinfo rwho and rusers SQL resolution service on UDP 1434: SQLPing Oracle TNS on TCP 1521/2483 NFS on TCP/UDP 2049 IPsec/IKE on UDP 500

Summary Enumeration  seal the lips of loose-talking software  reduce the info leaks Fundamental OS architectures Lock down by disabling or restricting access SNMP Default community string “public” give out data to unauthorized users Leaky OS services Services such as finger and rpcbind give too much info Custom applications Built-from-scratch  more info given out Firewalls Patching holes in software vs. screening by firewall

Homework #2 Ch2 & Ch3 (total: 180) Due: 4/21 (Mon) in midterm in printed hardcopy (format: problem, solution with explanation, screen dumps) (50 points) Select a target domain and use Nmap for the following tasks. host discovery on the selected domain, port scanning on a selected host, active stack fingerprinting on the selected host, version scanning on a selected port, vulnerability scanning on the selected port. (20 points) List and compare nmap-os-fingerprints used in Nmap and osprints.conf used in Siphon. Discuss how and why they differ. (20 points) List and compare nmap-services and nmap-service-probe. Discuss how and why they differ. (10 points) On a UNIX/Linux host, list /etc/inetd.conf. Discuss what services are being offered. (30 points) Select a target domain, run metaexploit with Nmap scans and import Nmap results into the database. Show found hosts and available ports. (30 points) Select a website to do banner grabbing with telnet, netcat, and grendel-scan, respectively. Show and compare their results. (20 points) Select a target domain to do automatic DNS enumeration by dnsenum to find subdomains, servers, and their IP addresses.