Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost 127.0.0.1 (loopback address)  Internal networks 

Slides:



Advertisements
Similar presentations
Ethical Hacking Module IV Enumeration.
Advertisements

SYSTEM ADMINISTRATION Chapter 19
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Homework 3.2 Clients Hub What’s wrong with this picture? Clients Using 100TX.
Windows 2003 SP1 Member Server in ASU Active Directory WNUG/CCC February 2, 2006 Sharon Bushart CLAS Information Technology.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
Network Shares and Accounts Sharing Printers, Drives, Folders – Setup Windows 95/98 Windows NT (2000, XP) Linux – Users – Groups.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
Windows Assessment Vulnerability Assessment Course.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
CNT-150VT. Question #1 Your name Question #2 Your computer number ##
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
Workshop 1: Introduction to TCP/IP
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
Hands-On Ethical Hacking and Network Defense
Chapter 3 Enumeration Last modified
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
CS391 Computer & Network Security
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
COMP1321 Digital Infrastructure Richard Henson February 2014.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
1 Welcome to CSC 301 Web Programming Charles Frank.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Chapter 3 Enumeration Last modified Definition Scanning identifies live hosts and running services Enumeration probes the identified services.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Hacking Windows What to do first?  Patch : of course the first thing to do is apply SP3 and the critical updates. More will come …critical updates.
Week 4-1 Week 4: Enumeration What is Enumeration? –Now that you have a live target the next step is find what services are running and what version.
Enumeration After scanning for live systems and services, hackers will probe the services more carefully looking for weaknesses This involves active connections!
Networking in Linux: a brief overview. TCP/IP  TCP/IP concepts we have seen are applicable to Linux (a version of UNIX, where TCP/IP started)  Some.
TCOM Information Assurance Management System Hacking.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Retina Network Security Scanner
Hands-On Ethical Hacking and Network Defense
Announcements RSA Security Conference (extra credit) RSA Security Conference (extra credit) –April 7 through April 11, San Francisco –Visit the Forum for.
Footprinting and Scanning
CS3695/M6-109 – Network Vulnerability Assessment & Risk Mitigation–
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Mitchell Adair Computer Security Group Feb. 10th, 2010 Enumerating Windows Users.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Getting Connected to NGS while on the Road…
CITA 352 Chapter 6 Enumeration.
Enumeration.
Introduction to Operating Systems
Footprinting and Scanning
Chapter 4: Security Baselines
Footprinting and Scanning
Getting Connected to NGS while on the Road…
Computer Networks Protocols
Presentation transcript:

Enumeration

Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks  Class A  Class B to  Class C to  Machines behind a firewall can use these internal IP numbers to communicate among them.  Only the firewall machine/device (host) needs to have an IP address valid in the Internet.

What is enumeration?  Categories  network resources and shares  users and groups  applications and banners  Techniques (OS specific)  Windows  UNIX/Linux Obtain information about accounts, network resources and shares.

Windows applications and banner enumeration  Telnet and netcat: same in NT and UNIX.  Telnet: Connect to a known port and see the software it is running, as in this example.example  Netcat: similar to telnet but provides more information.more information  Countermeasures: log remotely in your applications and edit banners.  FTP (TCP 21), SMTP (TCP 25) : close ftp, use ssh (we will see it later). Disable telnet in mail servers, use ssh.  Registry enumeration: default in Win2k and above Server is Administrators only.  Tools: regdmp (NTResource Kit) and DumpSec (seen previously).  Countermeasures: be sure the registry is set for Administrators only and no command prompt is accessible remotely (telnet, etc).  Novell, UNIX, SQL enumeration will be seen in another class.

Windows general security  Protocols providing information: CIFS/SMB and NetBIOS, through TCP port 139, and another SMB port, 445.  Banner enumeration is not the main issue. (UDP 137),  Null session command: net use \\19x.16x.11x.xx\IPC$ “” /u:””  countermeasures:  filter out NetBIOS related TCP, UDP ports (firewall).  disable NetBIOS over TCP/IP see ShieldsUp! page on binding.ShieldsUp! binding.  restrict anonymous using the Local Security Policy applet. More here. GetAcct bypasses these actions.Local Security Policy applethereGetAcct  Good source of system and hacking tools: Resource kits XP and 7. Some tools were re-written by hackers.XP7

Windows network resources  NetBIOS enumeration (if port closed, none work)  NetBIOS Domain hosts: net viewnet view  NetBios Name Table: nbtstat use and example and nbtscan. useexamplenbtscan  NetBIOS shares: DumpSec, Legion, NetBIOS Auditing Tool (NAT), SMBScanner, NBTdump (use, output).DumpSecLegionNATSMBScanneruseoutput  Countermeasures: as discussed previously = close ports , disable NetBIOS over TCP/IP  SNMP enumeration: SolarWinds IP Network Browser (commercial, see book).  Countermeasures: Windows close port 445.  Windows DNS Zone Transfers: Active Directory is based on DNS and create new vulnerability, but provides tool -- “Computer Management” Microsoft Management Console (MMC) -- to restrict zone transfers to certain IP numbers.Computer Management

Windows: user and group enumeration  Enumerating Users via NetBIOS: usernames and (common) passwords. Enum: use and output. DumpSec: output.commonuseoutput  Countermeasures: as before (close ports, no NetBIOS over TCP/IP)  Enumerating Users using SNMP: SolarWinds IP Network Browser. See also snmputil and read more in the book.IP Network Browser.snmputil  Windows Active Directory enumeration using ldp: Win 2k on added LDAP through the active directory - - you login once (the good) and have access to all resources (the security problem).  Threat and countermeasures in the book (better dealt with in Operating Systems):  close ports 389 and 3268,  upgrade all systems to Win2k or above before migrating to Active Directory.