1 CSCD 434 Lecture 5 Winter 2013 Reconnaissance. 2 Attack Stages Turns out, different reasons attackers want to attack you – Altruistic reasons to sheer.

Slides:



Advertisements
Similar presentations
WordPress Installation for Beginners Sheila Bergman
Advertisements

The Biosafety Clearing-House of the Cartagena Protocol on Biosafety Tutorial – BCH Resources.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
System Security Scanning and Discovery Chapter 14.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Ahmad Radaideh.  Abstract  Introduction  Google Cached Content  GOOGLE HACKING Procedures  Google Advance Operators  Google hacking Result Categories.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Chapter 5 Phase 1: Reconnaissance. Reconnaissance  Finding as much information about the target as possible before launching the first attack packet.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Viruses.
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
Name Resolution Domain Name System.
Wasim Rangoonwala ID# CS-460 Computer Security “Privacy is the claim of individuals, groups or institutions to determine for themselves when,
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
CIS 450 – Network Security Chapter 3 – Information Gathering.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Footprinting and Scanning
Computer Security By Duncan Hall.
Linux Operations and Administration
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Web Server Administration Chapter 4 Name Resolution.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
1 CAP6135: Malware and Software Vulnerability Analysis Reconnaissance.
Computer Security Sample security policy Dr Alexei Vernitski.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Penetration Testing Reconnaissance
Footprinting and Scanning
Common Methods Used to Commit Computer Crimes
Footprinting and Scanning
Active Orders Supplier Administrator Training Getting Started Activities This training presentation describes the Getting Started activities that will.
Web Penetration Testing and Ethical Hacking Capture the Flag
Acknowledgement Main lecture slides are adapted from Eastern Washington University, CSCD 434: Network Security (Spring 2014) By Carol Taylor
Introduction to Computers
Configuring Internet-related services
Web Servers / Deployment
CSCD 434 Lecture 3 Spring 2019 Reconnaissance.
Presentation transcript:

1 CSCD 434 Lecture 5 Winter 2013 Reconnaissance

2 Attack Stages Turns out, different reasons attackers want to attack you – Altruistic reasons to sheer profit – Serious attackers, accomplish goals in stages – Ed Skoudis, well-known security expert identifies 5 stages of attack

3 Attack Stages 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Covering Tracks and Hiding Today, look at Reconnaissance...

4 Purpose of Reconnaissance What is the purpose of reconnaissance? Find out information about target(s)‏ – More experienced attackers invest time and resources in information discovery – Like bank robbers Do they just decide one day to rob a bank? No. At least successful ones Research vaults, locks, address of bank and map an escape route – Computer Attack – no different

5 Attack Reconnaissance Sources – Low Technology Social Engineering Physical Reconnaissance Dumpster Diving

6 Attack Reconnaissance Social Engineering – Employees give away sensitive information – Most successful are calls to employees Call help desk as “new” employee for help with a particular task Angry manager calls lower level employee because password has suddenly stopped working System administrator calls employee to fix her account... requires using her password

7 Social Engineering Social engineering works, because it exploits human vulnerabilities – Desire to help – Hope for a reward – Fear of making a mistake – Fear of getting in trouble – Fear of getting someone else in trouble

8 Social Engineering Most Talented at Social Engineering – Kevin Mitnick, served almost five years in prison for breaking into computers and stealing data from telecommunications companies How did he do it? Built up inside knowledge, developed trust relationships, and lots of patience To get information needed to complete a hack, Mitnick spent days – Learning internal company lingo – Developing emotional connections with key people Security personnel and system administrators

9 Social Engineering is Easy Compare Social Engineering vs. Traditional way to obtain user password Assume already have user name, Ex. ctaylor Got it from Web site, news or forum group Traditional Steps 1. Scan network to see if ports are open 2. Assume you got an open port and machine didn't have latest patches, installed a rootkit onto victim network 3. Enumerate the network, looking for a password file May be large number of subnets and hosts

10 Social Engineering is Easy 4. Locate and copy encrypted password file Need to dump password file to your server to process the file Remain stealth the entire time, modifying logs, altering registry keys to conceal when files were accessed 5. Run cracking tools against encrypted file In privacy of own network, John the Ripper or Cain and Able will crack the file – Takes about a week...

11 Social Engineering is Easy Compare Social Engineering vs. Traditional way to obtain user password – Same goals but with Social Engineering 1. Make a phone call 2. Make another phone call, while you are chatting, ask for and receive logon credentials May be able to do it in one step, if lucky!!

12 Defences for Social Engineering User Awareness Train them to not give out sensitive information Security awareness program should inform employees about social engineering attacks No reason why a system administrator ever needs you to give him/her your password Help desk should have a way to verify the identify of any user requesting help Other ideas?

13 Attack Reconnaissance Physical Reconnaissance – Several Categories Tailgaiting, Shoulder Surfing, other tricks Tailgaiting – Usually easy to look like you belong to an organization Can sometimes walk through the door Can pose as someone related to an employee to gain access Temps, contractors, customers and suppliers all potentially have access

14 Tailgaiting Follow an authorized person into building – Look like you belong, have reason for being there, dress the part and act like you belong – Phone company or other service technician – Once inside, person is not typically challenged Key, Looks like he belongs – Has company logos, or carries briefcase, toolkit People take person at face value Partly social engineering too

15 True Story Person on the right looks like person on the left Person below walked around A NIST building in Washington DC unchallenged. Guards even held open doors for him to enter secure areas

16 Tailgaiting Physical Reconnaissance Once inside, have access to a lot of information Physical access to internal networks – Passwords, user information, internal telephone numbers, anything you want Defences – Badges and biometric information – Educate people against letting people into the building – Teach employees to question people they don't know

17 Shoulder Surfing Another physical method of gaining sensitive information – Coffee shops, airport lounges, hotel lobbies – Many people are completely unaware of being spied upon – What can you learn? Private sessions, government documents, corporate secrets, user names or passwords Even classified documents over the shoulder of an unwary government employee Defense – Be aware of who is around

18 Dumpster Diving Originated by phone phreaks – Precursor to hackers AT&T's monopoly days, before paper shredders became common – Phone phreakers used to organize regular dumpster runs against phone company plants and offices Target: Discarded and damaged copies of AT&T internal manuals – Learned about phone equipment

19 Attack Reconnaissance Dumpster Diving In General Go through someone’s trash Recover copies of Credit card receipts, Floppies, Passwords, usernames and other sensitive information

20 Dumpster Diving EWU – Student in Spring, 2008 found SSN number, address and SAT scores of high school student applying to EWU Mall in Spokane – Another student, Fall 2008 – Found little of interest when he staked out a store and had trouble accessing trash – Found some information, not sensitive

21 Defense Against Dumpster Diving Defence Shred all paper including post-it notes Don’t throw away floppies or other electronic media Secure trash areas, fence, locked gates

22 Technical Attack Reconnaissance

23 Domain Names – Registration process provides Guarantee of unique name Enter name in Whois and DNS Databases – Registrars Before 1999, one registrar, Network Solutions Now, thousands of registrars compete for clients complete list of registrars

24 Domain Names Internet Network Information Center – Search for domain name’s registrar – Comes back with registrar and other information

25 Internic.net/whois.html phptr.com

26 Example from Internic.net/whois phptr.com

27 Example Whois Query Tryit, Lets enter counterhack.net Answer is Domain Name: COUNTERHACK.NET Registrar: NETWORK SOLUTIONS, LLC Whois Server: whois.networksolutions.com Referral URL: Name Server: NS1.NETFIRMS.COM Name Server: NS2.NETFIRMS.COM Status: clientTransferProhibited Updated Date: 21-jun-2006 Creation Date: 22-jun-2001 Expiration Date: 22-jun-2008

28 Attack Reconnaissance Whois DB’s – For other countries, use – Military sites, use – Education, use

29 Attack Reconnaissance Details from the Whois DB – After obtaining the target’s registrar, attacker can obtain detailed records on target from whois entries at registrar's site – Can look up information by Company name Domain name IP address Human contact Host or server name

30 Attack Reconnaissance Details from the Whois DB If only know Company’s name Whois DB will provide lot more information – Human contacts – Phone numbers – addresses – Postal address – Name servers – the DNS servers Network Solutions

31 Counterhack.net Registrant: Skoudis, Edward 417 5TH AVE FL 11 NEW YORK, NY US Domain Name: COUNTERHACK.NET Administrative Contact : Skoudis, Edward 417 5TH AVE FL 11 NEW YORK, NY US Phone:

32 Counterhack.net.. Old Data Technical Contact : Network Solutions, LLC Sunrise Valley Drive Herndon, VA 20171, US Phone: Fax: Record expires on 22-Jun-2008 Record created on 22-Jun-2001 Database last updated on 21-Jun-2006 Domain servers in listed order: NS1.NETFIRMS.COM NS2.NETFIRMS.COM

33 Attack Reconnaissance ARIN DB In addition to the Whois DB, another source of information is the American Registry for Internet Numbers (ARIN)‏ ARIN maintains Web-accessible, whois-style DB lets users gather information about who owns particular IP address ranges Can look up IP’s in North and South America, Caribbean and sub-Saharan Africa Use: Then, type in IP address at the whois prompt In Europe use, Re’seaux IP Euorope’ens Network Coordination Centr (RIPE NCC)

34 Attack Recon Whois command – Or, instead of going to the Internet, you can just type whois from the command line of Linux – If the port number is not blocked!!! $ whois counterhack.net This will display all of the information available from the public dns records for that domain

35 Attack Reconnaissance Domain Name System (DNS)‏ – DNS is a worldwide hierarchical DB – Already said... Organizations must have DNS records for their systems associated with a domain’s name Using DNS records, attacker can compile a list of systems for attack Can even discover Operating System

36 Domain Name Hierarchy Root DNS Servers com DNS Servers net DNS Servers org DNS Servers counterhack.net DNS Server Example counterhack.net

37 Attack Reconnaissance Querying DNS – First, find out one or more DNS servers for a target system – Available from records gathered from the Whois DB Listed as “name servers” and “domain servers” One common tool used to query DNS servers is the nslookup command Included in all Unix flavors and Win NT/2000/XP

38 Attack Reconnaissance DNS Query First try to do a Zone transfer – Says “give me all the information about systems associated with this domain” – First use a server command to set DNS server to target’s DNS server – Then set the query up to retrieve any type of information – And finally to do the zone transfer

39 Attack Reconnaissance DNS Query Dig command – dig – Unix variations must use this for Linux $ counterhack.net -t AXFR This does a zone transfer... might not work Excellent reference for dig here Defences against DNS Queries Must have DNS records Need to map between IP addresses plus need to indicate name and mail servers

40 Attack Reconnaissance Defence against DNS Queries Restrict Zone Transfers – Only reason you allow Zone transfers is to keep secondary DNS server in sync with primary server – Configure DNS server to only allow Zone transfers to specific IP Addresses – Can also configure Firewalls or router to restrict access to TCP port 53 to back-up DNS server

41 Attack Reconnaissance General Purpose Reconnaissance Tools – Can also research target through attack portals on the web – Sites allow you to do research and even initiate an attack against the target

42 Google Hacking Basics

43 Google Hacking Good to understand how Google works – Understand then how Google can work for attackers to gain sensitive information – And, how you can defend against this type of information gathering

44 Google Basics Several components to Google – Google Bots Crawl web sites and search for information – Google Index Massive index of web pages – index is what gets searched. Relates pages to each other – Google Cache Copy of 101K of text for each page Even deleted pages still have copies in Google cache – Google API Programs perform search and retrieve results using XML Uses SOAP Simple Object Access Protocol – Need your own Google API key to use Google API

45 Google Basics Can use directives to focus search and limit amount of information returned – site:counterhack.net Says to search only in counterhack.net – filetype:ppt site:counterhack.net Limits file type to power point for counterhack.net site – cache: Good for removed pages Combining terms gives powerful searches – site:wellsfargo.com filetype:xls ssn Says to search only Wellsfargo site for spreadsheets with ssn – social security number

46 Google Basics If Web page removed – May still be in Google Cache – Another place for removed web pages Wayback Machine Archives old web pages Can search for active scripts – site:wellsfargo.com filetype:asp – site:wellsfargo.com filetype:cgi – site:wellsfargo.com filetype:php

47 Google Hacking – Something called – The Google Hacking Database (GHDB) Database of saved queries that identify sensitive data – Google blocks some better known Google hacking queries, nothing stops hacker from crawling your site and launching “Google Hacking Database” queries directly

48 Google Hacking Originally, Google Hacking Database located at Created by Johnny Long, a security “expert” – More information about Google hacking can be found: l=1

49 Google Hacking Now, Google Hacking DB is at different URL – – Johnny I hackstuff is off doing charitable work in Uganda – Being maintained by the Exploit DB people

50 Google Hacking What Can a hacker can learn from Google queries? Information Google Hacking Database identifies: – Advisories and server vulnerabilities – Error messages that contain too much information – Files containing passwords – Sensitive directories – Pages containing logon portals – Pages containing network or vulnerability data such as firewall logs

51 Other Search Engine Hacking Google Hacking Diggity Project google-hacking-diggity-project/ GoogleDiggity leverages the Google AJAX API BingDiggity is a new command line utility that leverages new Bing 2.0 API and Stach & Liu’s newly developed Bing Hacking Database (BHDB) to find vulnerabilities and sensitive information disclosures related to your organization that are exposed via Microsoft’s Bing search engine

52 Defenses from Google Hacking Check your site for Google hacking vulnerabilities – The easiest way to check whether web site/applications have Google hacking vulnerabilities Use a Web Vulnerability Scanner – Web Vulnerability Scanner scans your entire website and automatically checks for pages identified by Google hacking queries. Note: Your web vulnerability scanner must be able to launch Google hacking queries – Ex: Acunetix Web Vulnerability Scanner

53 Defenses from Hacking Diggity Project Google Hacking Alerts provide real-time vulnerability updates via RSS feeds Google Alerts have been created for all 1623 GHDB search strings – Generates new alert each time newly indexed pages by Google match one of those regular expressions

54 Defenses from Google Hacking If Google has cached a page or URL – Can have Google remove it – First, update your Web site and remove sensitive information – Then signal Google not to index or cache it Put a file, robots.txt in Web Server directory Says don’t search certain directories, files or entire Web site

55 Defenses Against Google Hacking Or, keep Google from accessing your pages with meta tags at top of Web pages – noindex, nofollow, noarchive and others Tells Google not to index, link or archive page Can also request directly from Google – Does the request in 24 hours or less Remove page from other places for non-Google search engines for Wayback Machine

56 More Tools ShodanHQ – SHODAN is a search engine that lets you find specific computers (routers, servers, etc.)‏ Using a variety of filters – Some have also described it as a public port scan directory or a search engine of banners

57 More Tools What does SHODAN index? – Bulk of data is taken from 'banners', which are meta-data the server sends back to the client – Information about the server software, – Options the service supports, – Welcome message or other information – Very useful for identifying specific machines

58 More Tools Maltego Allows you to enumerate network and domain information like: – Domain Names – Whois Information – DNS Names – Netblocks – IP Addresses Windows tool.... Overview nt/view/202/24/ nt/view/251/24/ Also allows you to enumerate People information like: – addresses associated with a person's name – Web sites – Social groups – Companies and organizations – Phone numbers

59 Maltego

60 Attack Reconnaissance Summary – At the end of this phase the attacker has information needed to move on to the next phase Scanning – At a minimum have Phone number List of IPs Address and domain name Lucky – has Operating System and Server names

61 References Mark Ciampa – Security + Guide to Network Security Fundamentals Johny Long – No Tech Hacking, Syngress, 2008 Kevin Mitnick – The Art of Deception, Wiley, 2002 Ed Skoudis – Counterhack Reloaded, Ch. 5, Step/dp/ /ref=cm_cr_pr_product_top

62 The End Lab this week is Metasploit Assignment 3 is up