Download presentation
Presentation is loading. Please wait.
1
Common Operating System Exploits
CSE Adrien Ibarra
2
This isn’t about “hacking”
This is more of a general overview, with an emphasis on some of the more prolific and easy- to-understand exploits, from the point of view of the operating system. *“Penetration Testing” or “Pen-Testing”*
3
1. Terminology Root Default user who has access to all commands and files. Buffer Overflow Overrun boundaries of a buffer during during execution allowing you to access data in other areas of memory.
4
1. Terminology Privilege Escalation Utilizing a bug in the OS to allow for access to resources that you do not have the credentials for. Zero days (0-day, O-day) A vulnerability that is unknown to the creator of the OS. Ports Form of endpoint communication for an OS. One of the easiest areas to exploit.
5
1. Terminology Shell Code Actual payload that will be injected into OS that takes advantage of exploit. Nmap Network scanner that provides immense amount of useful such as port scanning and OS Detection. Enumeration The process of finding out as much information about a computer before an exploit is attempted or found.
6
1.5 Ports NEVER USE TELNET - USE SSH
If you are using File Transfer Protocol (FTP) for example make sure to use SFTP to ensure there is no plain-text delivery. Close any ports that are not being used as they are susceptible to attacks. Basically, block everything and allow necessary ports. But, this is not perfect.
7
1.75 ShellCode
8
“Apple computers are secure because people are too focused on
making exploits for Windows.” Tip Nah.
9
“If I stay on top of my updates and I am security conscious, I’ll be fine.
Tip Nah.
10
2. Apple Keychain Dump Intentional, but extremely powerful
Apple has some of the simplest exploits available, shown by a combination of these two methods: Keychain Dump Intentional, but extremely powerful Single-User Mode Gives you the ability to reset master login password from a terminal before startup (Command-S before startup) -fsc
11
3. Windows Windows is the most popular operating system, thus, has an incredible amount of exploits. Let’s take a look at exploits that you can do today.
12
3. Windows Lotus Notes Privilege Escalation:
Works on versions between 8.5 and 9 Allows you to enter monitor mode through Notes diagnostics tool Monitor mode allows you access to all network data From here you can kill all processes, detach without killing, collect system info, or run process in privileged mode
13
3. Windows
14
3. Android Android is the most popular mobile phone OS, and therefore, has one of the most dangerous and easily exploitable bugs, ever. Blue Borne
15
3. Android BlueBorne: Utilizes buffer underflow - sending data slower than it can be read Exploit poses as a device that can be connected to, and executes shellcode before the connection can be confirmed. This allows for full access and control of your device as if you are using it
16
3. Android
17
You are never completely safe, however, you can make optimal choices to protect you from the average wanna-be “hacker”. Tip Disable Bluetooth when not in use Tip Deny access to all ports, opening only the absolute necessary Tip Disable Single-User Mode
18
Questions? Extra Resources if we have time: Rubber Ducky Exploit-DB
Metasploit
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.