31
Modern Modern information information gathering gathering Onderwerp: Datum: Aanwezigen: Classificatie: gathering gathering Modern Information Gathering 26-JUN-2012 OWASP Public

Modern information information gathering gathering

Embed Size (px)

Citation preview

Page 1: Modern information information gathering gathering

Modern Modern informationinformationgatheringgathering

Onderwerp:

Datum:

Aanwezigen:

Classificatie:

gatheringgathering

Modern Information Gathering

26-JUN-2012

OWASP

Public

Page 2: Modern information information gathering gathering

Who Am I

Dave van Stein

38 years38 years

Tester > 11 years

(Application) Security Testing

“Certified Ethical Hacker”

Page 3: Modern information information gathering gathering

Agenda

Goal of the presentation

What is Information Gathering ?

Domain scanning

Search engine ‘abuse’

Other tools

Some Social EngineeringSome Social Engineering

Remedies

Conclusions

Page 4: Modern information information gathering gathering

Give insight in amount of information anonymously available on internet about your system (and users)

Give insight in the amount and possibilities of tools freely available

Goal of this presentation

Identify entrypoint

Gain access

Secure access

Do stuff

Clear up the mess

Come back another time

(simplified procedure)

Page 5: Modern information information gathering gathering

‘Classic’ Domain Scanning

Steps involved:Get network information with ping and traceroute

Get DNS information with WHOIS and LOOKUP

Do DNS zone transfer for subdomains

Download website for extra info

Scan serversScan servers

Problems:DNS zone transfers often not authorized

Active connection with target => detectable

Page 6: Modern information information gathering gathering

Modern Information Gathering

Interesting information:

Domains and subdomains

IP adresses

Applications and technologies

Hotspots (known vulnerabilities)

Usernames and passwordsUsernames and passwords

Sensitive information

Passive

As little contact as possible with target

No direct scanning, no intrusion

No logging and no alarm triggering !

Page 7: Modern information information gathering gathering

Sources of information

Public records WHOIS: information about owner

DNS : information about IP adresses

Search engines Often little restrictions on websites

Cache all information gathered

Tweaking provides additional informationTweaking provides additional information

Various websites Anonymous

Combine above techniques

Sort results for nice presentation

Advanced and Automated Specialized (offline) Tools

scanning

Page 8: Modern information information gathering gathering

Shodanhq.com

Shodan

IP adresses

Server banner

X-Powered-by banner

CookiesCookies

Search filters

City, Country, Geo

Hostname, ip address / net block

Os, port

date (before / after)

ssl cert version, bits, issuer

ssl cipher support, bit support , protocol

Page 9: Modern information information gathering gathering

ServerSniff.net

Server Sniff

NS reports

Domain reports

SubdomainsSubdomains

Various (trace)routes

Various ping types

Shows robots.txt

Anonymous !

Page 10: Modern information information gathering gathering

Domain Scanning: Server Sniff

Page 11: Modern information information gathering gathering

Robtex.com

Page 12: Modern information information gathering gathering

Domain Scanning: Robtex

Domain ‘Swiss Army Knife’

Provides ALL information linked to a domain

Page 13: Modern information information gathering gathering

Domain scanning: Robtex

Page 14: Modern information information gathering gathering

Google Advanced search

filetype: (or ext:)Find documents of the specified type.

E.g. PDF, XLS, DOC

intext:The terms must appear in the text of the page.The terms must appear in the text of the page.

intitle:The terms must appear in the title of the page.

inurl:The terms must appear in the URL of the page.

Page 15: Modern information information gathering gathering

Google Hacking Database

www.johnny.ihackstuff.com

(edit: http://johnny.ihackstuff.com/ghdb.php)

Collection of queries for

finding ‘interesting’ stuff

No longer updated

Possible results of GHD:

Identify systems in use (including version)

Identify known exploits

Locations of sensitive information

User-id’s & passwords

Logging files

Many other things

Page 16: Modern information information gathering gathering

The NEW and IMPROVED GHDB

Page 17: Modern information information gathering gathering

Bing.com

Finds subdomains with ‘IP:x.x.x.x’

Page 18: Modern information information gathering gathering

Baidu

inurl:

intitle:

site:

Page 19: Modern information information gathering gathering

Example

Page 20: Modern information information gathering gathering

SearchDiggity

Page 21: Modern information information gathering gathering

Stach & Liu

Page 22: Modern information information gathering gathering

SEO Tools

Page 23: Modern information information gathering gathering

Domain Scanning ‘on-the-fly’

Passive Recon (Firefox add-on)

Page 24: Modern information information gathering gathering

FOCA

Page 25: Modern information information gathering gathering

Maltego

Intelligence and forensics tool

Connects many different sources of info

Represents in graphical way

Very extensive capabilities

Page 26: Modern information information gathering gathering

Maltego

Can also be used for social engineering

- Facebook & twitter

- Email adresses

- Phone numbers

- etc

Page 27: Modern information information gathering gathering

theHarvester

Page 28: Modern information information gathering gathering

Conclusions

What search engines see, hackers can abuse

Anonymous, online and offline, Highly automated

Many tools are freely availableMany tools are freely available

Networks can be mapped with much detail in minutes

Much information about your company, systems and users available on internet

Page 29: Modern information information gathering gathering

Remedies (1/2)

Limit access • Allow search engines only to see what they need to see. • Make sure unauthorized users are not able to look into or even see files

they do not need to see. • Force possible intruders to use methods that can be scanned and

monitored.

Use the tools of hackersUse the tools of hackers• Scan your systems with the tools hackers use and check the information

that is found. • Scan for error messages and other things that reveal information about

the system and services and remove them.

Check what spiders can see• Use a spider simulator to check what spiders can see and if your

application still functions correctly.

Page 30: Modern information information gathering gathering

Remedies (2/2)

Awareness • Be aware of all possible sources of information. Create awareness

among employees. Assume all information will possibly abused

Clean documents • Remove al metadata from documents before publishing. • Remove al metadata from documents before publishing.

Audit frequently• Keep your knowledge up-to-date and scan regularly for

information that can be found about your systems or hire professionals do to it for you.

Page 31: Modern information information gathering gathering

Interesting books on the subject