45
Internet Hacking Presentation prepared by: Alex Epstein Asif Hussain Genci Seseri Group 2 Group 2

Internet Hacking

Embed Size (px)

DESCRIPTION

Internet Hacking. Presentation prepared by: Alex Epstein Asif Hussain Genci Seseri. Group 2. Internet Hacking. The Presentation talks about: Hacking History and General Information. - PowerPoint PPT Presentation

Citation preview

Page 1: Internet  Hacking

Internet Hacking

Presentation prepared by:

Alex Epstein

Asif HussainGenci Seseri

Group 2Group 2

Page 2: Internet  Hacking

Internet Hacking

The Presentation talks about:

Hacking History and General Information.

Various techniques that hackers use to crack the networks and websites and measures vital for survival against such attacks.

Port Scanning using PortQry.exe

Page 3: Internet  Hacking

Hacking History

• 1878 – “practical jokers” at Bell Telephone Co.

• Early 1960s – MIT geeks created “hacks”, programming shortcuts to speed up tasks

• 1969 – best hack. 2 Bell Labs employees created UNIX, a open machine run rules set.

• 1971 – using free whistle as a phone tone • 1978 – 1st bulletin board

Page 4: Internet  Hacking

Hacking History (Cont.)

• 1984 – the great hacking war begins. Legion Of Doom vs. Masters Of Deception. The war especially escalated in 1990-91.

• 1986 – Federal Computer Fraud And Abuse Act is passed. Numerous arrests follow.

• 2000 – “denial of service” attacks.

Page 5: Internet  Hacking

Selected Lingo

• Cracker: a malicious system security breaker.

• Hacker: a person enjoying exploring the systems and stretching their capabilities; programmer enthusiast; good fast programmer; expert in a specific field

• KISS Principle: “Keep It Simple, Stupid”• Trojan Horse: a malicious security breaking

program disguised as something benign• Wetware: humans and our nervous system

compared to software and/or hardware

Page 6: Internet  Hacking

Hacker Psych 101

• Robin Hood Syndrome – misconstruing consequences of one’s own behavior as beneficial for society

• Hacker Categories:1. Old School : hacking = honor. Interested in code,

but not with criminal intent; little concern for privacy and property of information. Internet is an open system.

2. Script Kiddies/ Cyber Punks: common “hackers”. Arrested often, because brag online. D/load code and hack it out of boredom. Avg.: white male 12-30 years old with high school education.

Page 7: Internet  Hacking

Hacker Psych 101(Cont.)

• Hacker Categories (cont.):3. Professional criminals/Crackers: make living

by breaking into system. May be hired for espionage or linked to criminal groups. Crack because of inferiority. Cracking a site gives them power. Refuge in computers to avoid real world relations.

4. Coders and Virus Writers: the least studied; see themselves as “elite”. Own test networks (“Zoos”). Vast, programming skills, but, not use code. Let others introduce it into the Internet (“The Wild”).

Page 8: Internet  Hacking

Hacker Attitude

• The world is full of fascinating unsolved problems

• No problem should have to be solved twice

• Boredom and drudgery are evil• Freedom is good• Attitude is no substitute for

competence

Page 9: Internet  Hacking

Hacking Skills

• Programming skills• Running open source UNIX code• Using WWW and writing HTML• Functional English skills

Page 10: Internet  Hacking

Hackers’ Respect • To be respected by hackers you can…:

– Write open source software– Help test and/or debug open source software– Publish useful information– Maintain the working infrastructure– Serve the hacker culture – Do off-computer work:

• Learn to write in native language• Read science fiction• Study Zen and/or take on martial arts• Analyze music• Appreciate puns and wordplay

Page 11: Internet  Hacking

Hackers’ Disrespect

• As a hacker, you should not:– Use silly grandiose user ID or screen

name– Get in flame wars on Usenet or

anywhere else– Call yourself cyberpunk or waste your

time on such people– Write e-mails or other posting full of

misspellings or bad grammar

Page 12: Internet  Hacking

Hackers Hall Of Fame• Richard Stallman: A hacker of the old school, he

got a job at MIT's Artificial Intelligence Lab off the street in 1971

• Dennis Ritchie and Ken Thompson:The founders of Bell Labs‘ legendary CS operating group, which created UNIX.

• John Draper: Figured out the whistle tone “trick”• Kevin Mitnick: The first hacker to have his face

immortalized on an FBI "Most Wanted" poster• Vladimir Levin: Allegedly masterminded the

Russian hacker gang that tricked Citibank's computers into spitting out $10 million.

• Linus Torvalds: Was a CS student at University of Helsinki when he wrote Linux in 1991

Page 13: Internet  Hacking

CRACKER EXPLOITS AND BATTLE PLANS

This part of the Presentation talks about:

Various techniques that hackers use to crack the networks and websites.

Measures vital for survival against such attacks.

Page 14: Internet  Hacking

IP Spoofing• IP spoofing is when an attacker captures the

routing packets to redirect a file or transmission to a different destination.

• The technique is also effective in disguising an attacker's identity.

• Protocols that deal with inter-computer communication are most susceptible to spoofing,e.g., ICMP, IGMP and UDP.

• Solution is securing transmission packets and establishing screening policies, point to point encryption, configuring network to reject packets that claim to originate from a local address.

Page 15: Internet  Hacking

FTP AttacksOne of the most common FTP attacks is a

buffer overflow caused by a malformed command.

A successful attack could either drop the attacker in a command shell or cause a denial of service.

Failure to apply the frequently released system upgrades and patches is the most common cause of FTP vulnerabilities.

FTP exploits are also useful in password guessing , FTP bounce attacks, and mining information (such as the machine's registry).

Page 16: Internet  Hacking

Unix Finger ExploitsThe Unix OS finger utility was used as an efficient

way to share user information in the early days of the Internet.

To an attacker, the Finger utility can yield valuable information, including user names, logons and contact information.

It also provides a pretty good indication of users' activities like how many times they are logged on.

The personal information it reveals can provide an attacker with enough of a framework to trick legitimate users into revealing passwords and access codes.

Page 17: Internet  Hacking

Flooding and BroadcastingAn attacker can significantly reduce the

processing capacity of a network by sending more information requests than it can handle-a classic denial of service.

Sending a large amount of requests to a single port is Flooding. When the requests are sent to all network stations, it's called broadcasting.

Attackers will often use flood attacks to gain access to a system for use against other networks in distributed denial-of-service (DDoS) campaigns.

DDoS attacks are harder to stop because they come from multiple IP addresses simultaneously. The only solution is to trace the packets back to their source and shutdown the transmitting networks.

Page 18: Internet  Hacking

Fragmented Packet AttacksInternet messages transmitted via TCP/IP can be

divided into packets in such a way that only the first packet contains the TCP segment header information.

Some firewalls will allow the processing of subsequent packets that do not contain the same source address information as the first packet, which can cause any type of system to crash.

Fragmented packets can also create a flood-like situation because they are stored in the Kernel. The server will crash if the kernel memory absorbs too many fragmented packets.

Solution : Firewall Filters

Page 19: Internet  Hacking

Email ExploitsE-mail exploits come in five forms: mail

floods, command manipulations, transport-level attacks, malicious code insertion and social engineering.

Mail-flood attacks occur when so much mail is sent to a target that communication programs destabilize and crash the system.

Command-manipulation attacks can cause a system to crash by subverting the mail transfer agent with a buffer overflow caused by entering a malformed command.

Page 20: Internet  Hacking

Email Exploits (Contd…)Transport-level attacks exploit the SMTP. An

attacker can cause a temporary error condition in the target system by overloading an SMTP buffer with more data than it can handle.

Malicious content is often propagated through e-mail systems. Some viruses and worms will be carried into a system appearing as a legitimate attachment

Social engineering e-mails are an attacker's attempt to trick a legitimate user into revealing sensitive information or executing a task. E.g., posing as a network administrator to get your password for system upgrades.

Page 21: Internet  Hacking

Password AttacksThe most common password attacks are guessing,

brute force, cracking and sniffing. Password guessing involves entering common

passwords either manually or through programmed scripts.

Brute-force logon attacks follow the same basic logic as password guessing, but are faster and more powerful.

Password cracking is a method for defeating the protection of encrypted passwords stored in a system's admin files.

Because an attacker needs a significant level of access to launch this kind of attack, the best defense is restricting and monitoring access privileges.

Page 22: Internet  Hacking

Selective Program Insertions

A selective program insertion is when an attacker places a destructive program—a virus, worm or Trojan horse--on a target system.

Some network administrators are augmenting their malware defenses with alternative technologies such as behavior blockers, which stop suspicious code based on behavior patterns, not signatures.

A time bomb, sometimes called a logic bomb, is an inserted program that executes its malicious payload on a predetermined time or date.

Page 23: Internet  Hacking

Port Scanning and Polling

Through port scanning and polling, an attacker can observe the functions and defenses of various system ports.

For example, scanning could be used to determine whether default SNMP community strings are open to the public, meaning information can be extracted for use in a remote command attack.

Page 24: Internet  Hacking

TCP/IP Sequence Stealing & Packet Interception

TCP/IP sequence stealing is the capturing of sequence numbers, which can be used to make an attacker's packets appear legitimate.

A successful TCP/IP attack could allow an attacker to intercept transactions between two organizations, providing an opportunity for a man-in-the-middle attack.

In some versions of Secured Shell Service Daemon (SSHD), only the public key is used for authentication. If an attacker learns the public key, he could create and insert forged packets.

Page 25: Internet  Hacking

Observations and Suggestions

Various firms

Install firewall, but never upgrade them.

Do massive Website improvements without making parallel security improvements.

The best way to safeguard a website from attack is to approach security as the ongoing challenge rather than a one time effort.

Page 26: Internet  Hacking

Port Scanning Using PortQry

• What is port scanning?• Using PortQry

(the Portqry.exe command-line utility)

Page 27: Internet  Hacking

What Is Port Scanning?

• Network applications use TCP/UDP ports

• Clients connect to applications using ports

• Port scanning is the process of checking whether a port is open

UDP135

TCP389

ICMPIP

Ethernet

Transport

Internet

Network

Page 28: Internet  Hacking

TCP and UDP in TCP/IP protocol

architecture

Page 29: Internet  Hacking

Port Numbers

• The Well Known Ports are those from 0 through 1023.

• The Registered Ports are those from 1024 through 49151.

• The Dynamic and/or Private Ports are those from 49152 through 65535.

http://www.iana.org/assignments/port-numbersftp://ftp.isi.edu/in-notes/rfc1700.txt

Page 30: Internet  Hacking

Well-know TCP / UDP portsTCP Port Number Description

20 FTP (Data Channel)

21 FTP (Control Channel)

23 Telnet

80 HyperText Transfer Protocol (HTTP) used for the World Wide Web

139 NetBIOS session service

UDP Port Number Description

53 Domain Name System (DNS) Name Queries

69 Trivial File Transfer Protocol (TFTP)

137 NetBIOS name service

138 NetBIOS datagram service

161 Simple Network Management Protocol (SNMP)

Page 31: Internet  Hacking

Port Scanning for TCP

• TCP ports use "three-way handshake"

• Successful handshake means port is listening

• TCP Reset packet means port is not listening

• No response means port is filtered

TCP389

ICMPIP

Ethernet

Transport

Internet

Network

Page 32: Internet  Hacking

Port Scanning for UDP

• UDP ports do not use "three-way handshake"

• Send UDP packet to port and wait for response

• Most applications will not respond to zero-length packets

• Formatted packet is necessary to get a response

• Most port scanners do not scan UDP ports

UDP135

ICMPIP

Ethernet

Transport

Internet

Network

Page 33: Internet  Hacking

What Is Port Scanning used for?

Use port scanning to:

• Test connectivity

• Test securityServer

Port Scanner App

TCP 25: SMTPTCP 80: WWWUDP 135: RPC EPMUDP 389: LDAP

query ports

Firewall

Page 34: Internet  Hacking

Using PortQry• PortQry is designed as an

application layer port scanner• It checks whether TCP and UDP

ports are open, closed, or filtered

• It determines if UDP ports are open using packets formatted for well known servicesPortqry is available for download on the Microsoft Web site at:

http://download.microsoft.com/download/win2000adserv/Utility/1.0

/NT5/EN-US/portqry.exe

Page 35: Internet  Hacking

PortQry Supports:

• LDAP• RPC• DNS• SMTP• POP3• IMAP4• FTP • NetBIOS Name

Service

UDP135

RPCEPM

TCP389

LDAP

ICMPIP

Ethernet

ApplicationSession

Transport

Internet

Network

Page 36: Internet  Hacking

Status of a TCP/IP port• Listening

– A process is listening on the port on the computer you choose. Portqry.exe received a response from the port.

• Not Listening– No process is listening on the target port on the target system.

Portqry.exe received an Internet Control Message Protocol (ICMP) "Destination Unreachable - Port Unreachable" message back from the target UDP port. Or if the target port is a TCP port, Portqry received a TCP acknowledgement packet with the Reset flag set.

• Filtered– The port on the computer you chose is being filtered.

Portqry.exe did not receive a response from the port. A process may or may not be listening on the port. By default, TCP ports are queried three times and UDP ports are queried once before a report indicates that the port is filtered.

Page 37: Internet  Hacking

PortQry Usageportqry -n server [-p protocol] [-e || -r || -o endpoint(s)] [-l

logfile] [-s] [-q]Where:

-n [server] IP address or name of server to query

-p [protocol] TCP or UDP or BOTH (default is TCP)

-e [endpoint] single port to query (valid range: 1-65535)

-r [end point range] range of ports to query (start:end)

-o [end point order] range of ports to query in an order (x,y,z)

-l [logfile] name of log file to create

-s 'slow link delay' waits longer for UDP replies from remote systems

-q 'quiet' operation runs with no output

returns 0 if port is listening

returns 1 if port is not listening

returns 2 if port is listening or filtered

Page 38: Internet  Hacking

portqry -n myserver -p UDP -e 389Returns LDAP base query information

UDP port 389 (unknown service): LISTENING or FILTEREDSending LDAP query to UDP port 389...LDAP query response:

currentdate: 09/03/2001 05:42:40 (unadjusted GMT) subschemaSubentry:

CN=Aggregate,CN=Schema,CN=Configuration,DC=eu,DC=reskit,DC=comdsServiceName: CN=NTDS Settings,CN=RED-DC-11,CN=Servers,CN=NA-WA-

RED,CN=Sites,CN=Configuration,DC=eu,DC=reskit,DC=comnamingContexts: DC=redmond,DC=eu,DC=reskit,DC=comdefaultNamingContext: DC=redmond,DC=eu,DC=reskit,DC=comschemaNamingContext: CN=Schema,CN=Configuration,DC=eu,DC=reskit,DC=comconfigurationNamingContext: CN=Configuration,DC=eu,DC=reskit,DC=comrootDomainNamingContext: DC=eu,DC=reskit,DC=comsupportedControl: 1.2.840.113556.1.4.319supportedLDAPVersion: 3supportedLDAPPolicies: MaxPoolThreadshighestCommittedUSN: 4259431supportedSASLMechanisms: GSSAPIdnsHostName: myserver.eu.reskit.comldapServiceName: eu.reskit.com:[email protected]:

CN=MYSERVER,CN=Servers,CN=Sites,CN=Configuration,DC=eu,DC=reskit,DC=com

supportedCapabilities: 1.2.840.113556.1.4.800isSynchronized: TRUEisGlobalCatalogReady: TRUE

======== End of LDAP query response ========

UDP port 389 is LISTENING

Page 39: Internet  Hacking

portqry -n myserver -p UDP -e 135Dumps RPC EndPoint Mapper database

UDP port 135 (epmap service): LISTENING or FILTEREDQuerying Endpoint Mapper Database...Server's response:

UUID: 50abc2a4-574d-40b3-9d66-ee4fd5fba076 ncacn_ip_tcp:169.254.12.191[4144]

UUID: ecec0d70-a603-11d0-96b1-00a0c91ece30 NTDS Backup Interfacencacn_np:\\\\MYSERVER[\\PIPE\\lsass]

UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2 MS NT Directory DRS Interfacencacn_ip_tcp:169.254.12.191[1030]

UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2 MS NT Directory DRS Interfacencadg_ip_udp:169.254.12.191[1032]

UUID: 12345678-1234-abcd-ef00-01234567cffb ncacn_np:\\\\MYSERVER[\\PIPE\\lsass]

UUID: 12345678-1234-abcd-ef00-01234567cffb ncacn_np:\\\\MYSERVER[\\PIPE\\POLICYAGENT]

Total endpoints found: 6

==== End of RPC Endpoint Mapper query response ====

UDP port 135 is LISTENING

Page 40: Internet  Hacking

portqry -n myserver -p UDP -e 53

• Verifies DNS query and response operation

UDP port 53 (domain service): LISTENING or FILTERED

Sending DNS query to UDP port 53...UDP port 53 (domain service): LISTENING

Page 41: Internet  Hacking

portqry -n MyMailServer -p TCP -e 25

• Returns SMTP, POP3, IMAP4 status messages

TCP port 25 (SMTP service): LISTENINGData returned from the port:220 MyMailServer.eu.reskit.com Microsoft ESMTP

MAIL Service, Version: 5.0.2195.2966 ready at Sun, 2 Sep 2001 23:24:30 -0700

Page 42: Internet  Hacking

portqry -n MyFtpServer -p TCP -e 21

• Returns FTP status message and tests for anonymous account access

220 MyFtpServer Microsoft FTP Service (Version 5.0).

331 Anonymous access allowed, send identity (e-mail name) as password.

Page 43: Internet  Hacking

portqry -n myserver -p UDP -e 137

• Verifies NetBIOS Name Service functionality and returns MAC address

UDP port 137 (netbios-ns service): LISTENING or FILTERED

Attempting NETBIOS adapter status query to UDP port 137...

Server's response: MAC address 00c04f7946f0UDP port: LISTENING

Page 44: Internet  Hacking

Query behavior configurable using local service file

• Located in%systemroot%/system32/drivers/etc/service

• Resolves service name using this file

• Decides what type of query to send to port using this file

Page 45: Internet  Hacking

References

• http://www.tlc.discovery.com/convergence/hackers/hackers.html

• http://www.tuxedo.org/~esr/faqs/hacker-howto.html

• http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/

• http://www.infosecuritymag.com/articles/march01/features4_battle_plans.shtml

• http://www.nmrc.org/faqs/www/wsec09.html• http://www.microsoft.com/. Tim Rains Tim Rains • • Technical Lead Technical Lead • •

Networking TeamNetworking Team

• Q310099, "Description of the Portqry.exe Command-Line Utility"