21
Hacking Techniques and Countermeasures E. Ray Howard, Jr Sprint E|Solutions http://www.sprintesolutions.com [email protected]

Hacking Techniques and Countermeasures

  • Upload
    jerom

  • View
    39

  • Download
    5

Embed Size (px)

DESCRIPTION

Hacking Techniques and Countermeasures. E. Ray Howard, Jr Sprint E|Solutions http://www.sprintesolutions.com [email protected]. Objective:. Discuss the practice of hacking in general and demonstrate a few of the current common methods and exploits. - PowerPoint PPT Presentation

Citation preview

Page 1: Hacking Techniques and Countermeasures

Hacking Techniques and Countermeasures

E. Ray Howard, JrSprint E|Solutionshttp://[email protected]

Page 2: Hacking Techniques and Countermeasures

Objective:

Discuss the practice of hacking in general and demonstrate a few of the current common methods and exploits.

Mainly a demonstration of some current web hacking methods.

Page 3: Hacking Techniques and Countermeasures

Reasons to hack.

Curiosity.Revenge.Notoriety/Fame.Profit ($$$ or other gain).

Page 4: Hacking Techniques and Countermeasures

Hacker methodologies.

Oxymoron? Not really. There is normally some method to this madness.

Based on systematically exploiting weaknesses in your security infrastructures, both physical and IT.

Page 5: Hacking Techniques and Countermeasures

A common methodology is the following:

1. Gather target information.2. Identify services offered by target to the

public (whether intentional or not).3. Research the discovered services for

known vulnerabilities.4. Attempt to exploit the services.5. Utilize exploited services to gain

additional privileges from the target. Reiterate steps 1-5 until goals are achieved.

Page 6: Hacking Techniques and Countermeasures

Step 1: Gather target information.

Domain names, IP address ranges.InterNIC contact information.Physical addresses.Organizational structures.Alliances and financial information.Names of officers, managers, technical

staff.Newsgroup posts.

Page 7: Hacking Techniques and Countermeasures

Step 2: Identify services.

Web servers.FTP servers.DNS servers.e-mail gateways.Help desks/phone support.Other (gopher, LDAP, irc, etc.)

Page 8: Hacking Techniques and Countermeasures

Step 3: Research vulnerabilities.

Vendor announcements.Default configurations.Poor configurations. (i.e. passwords,

cleartext protocols)Gather available exploits or develop

new exploit.Derived exploits.Some original work.

Page 9: Hacking Techniques and Countermeasures

Step 4: Exploit vulnerabilities.

Attempt to exploit vulnerabilities to gain access to the target.

Continue until successful.

Page 10: Hacking Techniques and Countermeasures

Step 5: Utilize increased access.

Exploit additional vulnerabilities to gain additional access and information to use in penetrating further into an organization.

The hacker "becomes" a legitimate user (even an administrator).

Page 11: Hacking Techniques and Countermeasures

Demo 1: IIS web exploit.

Note: Only requires normal web user access to an

IIS webserver (i.e. port 80 or 443). Using non-standard ports for your web server

only makes this marginally more difficult. You do publish how to access your webserver to someone, right? (also, you would be surprised what search engines contain about you.)

Using SSL (https protocoll) will not prevent the exploit from succeeding.

Page 12: Hacking Techniques and Countermeasures

Demo 1: Software levels

Target: Windows NT Server 4.0sp6a, IIS 4.0

Attacker: Linux 2.2.17-21mdk kernel, Window NT Worstation 4.0 sp6a

Page 13: Hacking Techniques and Countermeasures

•Demo 1: Target info.

Target IP address is 192.168.168.125Query whois database at ARIN.net to

locate owner and domain information.

Also try reverse DNS mappings for host/domain names.

Page 14: Hacking Techniques and Countermeasures

Demo 1: Services infomation

Use nmap to scan target for services of interest.

$ nmap -sS -p 21-25,80,135-139,443 192.168.168.125

Starting nmap V. 2.53 by [email protected] ( www.insecure.org/nmap/ )Interesting ports on (192.168.168.125):(The 7 ports scanned but not shown below are in state: closed)Port State Service21/tcp open ftp80/tcp open http135/tcp open loc-srv139/tcp open netbios-ssn443/tcp open https

Nmap run completed -- 1 IP address (1 host up) scanned in 1 second

Page 15: Hacking Techniques and Countermeasures

Demo 1: Research services

Use netcat or telnet commands to determine web server information.

$ nc 198.168.168.125 80HEAD / HTTP/1.0<CR>

HTTP/1.1 200 OKServer: Microsoft-IIS/4.0Content-Location: http://192.168.168.125/Default.htmDate: Mon, 06 Aug 2001 23:40:10 GMTContent-Type: text/htmlAccept-Ranges: bytesLast-Modified: Mon, 30 Jul 2001 15:28:47 GMTETag: "c0bf6c53c19c11:b50"Content-Length: 4325

Page 16: Hacking Techniques and Countermeasures

Demo 1: Exploit services to gain access

Unicode “dot dot” exploit to traverse filesystem.

Default configuration of Inetpub\scripts directory is used to upload and execute commands of our choice.

Get target to fetch useful commands.Get target to initiate a command session.Use target to obtain additional

information.

Page 17: Hacking Techniques and Countermeasures

Demo 1: Prevention

Stay current on patch levels for Microsoft's OS and web server.

Implement good firewalling. Use an IDS system (or two!). Host security is important (Microsoft's "Securing

IIS” and “Securing Windows NT” documents). Pattern matching intercept proxies.

Page 18: Hacking Techniques and Countermeasures

Summary: Prevention.

Q: How to prevent becoming a target?A: You can't, if your company has an

Internet presence (or remote access, or vendor/VAR networks, or employees).

S: The only reliable solution to reduce the risk of a successful intrusion attempt is staying current with your security infrastructure is . This is an ongoing dynamic process.

Page 19: Hacking Techniques and Countermeasures

Useful security related links.

SANS Institute (www.sans.org)

Security Focus Archives (www.securityfocus.com)

Snort IDS home (www.snort.org)

Security archives (archives.neohapsis.com)

CERT Coordination Center (www.cert.org)

Page 20: Hacking Techniques and Countermeasures

Mailing Lists

Risks Digest (www.risks.org) BUGTRAQ

(www.securityfocus.com/bugtraq/archive) NTBugtraq (www.ntbugtraq.com) Win2KSecurity Advice (www.ntsecurity.net)

Page 21: Hacking Techniques and Countermeasures

Securing Webservers

Apache project (www.apache.org) http://httpd.apache.org/docs/misc/tutorials.html

support.microsoft.com"Resources for Securing Internet Information

Services”, Article ID Q282060.