27
1 PETER WOOD – THE ETHICAL HACKER

Peter wood – the ethical hacker

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Peter wood – the ethical hacker

1

PETER WOOD – THE ETHICAL HACKER

Page 2: Peter wood – the ethical hacker

The Ultimate Defence:

Think Like a Hacker

Peter WoodChief Executive Officer

First•Base Technologies LLP

An Ethical Hacker’s View of Corporate Security

Page 3: Peter wood – the ethical hacker

Who is Peter Wood?

Worked in computers & electronics since 1969

Founded First Base in 1989 (one of the first ethical hacking firms)

CEO First Base Technologies LLPSocial engineer & penetration testerConference speaker and security ‘expert’

Member of ISACA Security Advisory GroupVice Chair of BCS Information Risk Management and Audit GroupUK Chair, Corporate Executive Programme

FBCS, CITP, CISSP, MIEEE, M.Inst.ISPRegistered BCS Security ConsultantMember of ACM, ISACA, ISSA, Mensa

Page 4: Peter wood – the ethical hacker

Thinking like a hacker

• Hacking is a way of thinkingA hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. [Bruce Schneier]

• Hacking applies to all aspects of life- not just computers

Page 5: Peter wood – the ethical hacker

Network Device Compromise

Page 6: Peter wood – the ethical hacker

SNMPSimple Network Management Protocol

• A protocol developed to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network

• Enables network administrators to manage network performance, find and solve network problems, and plan for network growth

• SNMP v1 is the de facto network management protocol

• SNMP v1 has been criticised for its poor security. Authentication is performed only by a ‘community string’, in effect a type of password, which is transmitted in clear text

Page 7: Peter wood – the ethical hacker

SNMP Scanning

Page 8: Peter wood – the ethical hacker

SNMP for hackers• If you know the read string (default public) you can read the entire MIB for

that device

• If you know the read-write string (default private) you may be able to change settings on that device

• You may be able to ‘sniff’ community strings off the network if they’ve been changed from the defaults

• You may be able to control a router or switch:– Intercept traffic and read sensitive information

– ‘Crash’ the network repeatedly

– Lock the device out, requiring physical access to reset it

• You may be able to list users, groups, shares etc. on servers

• You may be able to subvert wireless network security

Page 9: Peter wood – the ethical hacker

Windows Hacking

Page 10: Peter wood – the ethical hacker

Windows architecture

DomainController

DomainController

MemberServer

MemberServer

Workstation

Workstation

Workstation

Domain users and groups

Domain users and groups

Local users and groups

Local users and groups

Local users and groups

Local users and groups

Local users and groups

Domain logon

Global group in local group

Local logon

Page 11: Peter wood – the ethical hacker

List privileged accounts andlook for service accounts

Page 12: Peter wood – the ethical hacker

Case study: Administrator passwords

admin5crystalfinancefridaymacadminmonkeyorangepasswordpassword1praguepuddingrocky4securitysecurity1sparklewebadminyellow

Global firm worth £800million

• 67 Administrator accounts

• 43 simple passwords (64%)

• 15 were “password” (22%)

• Some examples we found ->

Page 13: Peter wood – the ethical hacker

Case study: password crack

• 26,310 passwords from a Windows domain

• 11,279 (42.9%) cracked in 2½ minutes

• It’s not a challenge!

Page 14: Peter wood – the ethical hacker

Laptop hacking

Page 15: Peter wood – the ethical hacker

If we can boot from CD or USB …

Page 16: Peter wood – the ethical hacker

We have some passwords!

Page 17: Peter wood – the ethical hacker

… or just read the disk

Page 18: Peter wood – the ethical hacker

Change the Administrator password

Page 19: Peter wood – the ethical hacker

Desktop & Laptop Security

• Physical security on Windows desktops and laptops doesn’t exist

• Native Windows security is ineffective if you have physical access

• Everything is visible: e-mails, spreadsheets, documents, passwords

• If it’s on your machine - it’s stolen!

• Encryption is the best defence, coupled with lots of training!

Page 20: Peter wood – the ethical hacker

Attack the building

Page 21: Peter wood – the ethical hacker

Impersonating an employee

Page 22: Peter wood – the ethical hacker

Impersonating a supplier

Page 23: Peter wood – the ethical hacker

Do-it-yourself ID cards

Page 24: Peter wood – the ethical hacker

Impersonate a cleaner• No vetting• Out-of-hours access• Cleans the desks• Takes out large black sacks

Page 25: Peter wood – the ethical hacker

Data theft by keylogger

Page 26: Peter wood – the ethical hacker

Keyghost log file

Keystrokes recorded so far is 2706 out of 107250 ...

<PWR><CAD>fsmith<tab><tab>arabella xxxxxxx <tab><tab> None<tab><tab> None<tab><tab> None<tab><tab> <CAD> arabella<CAD><CAD> arabella<CAD><CAD> arabellaexittracert 192.168.137.240telnet 192.168.137.240cisco

Page 27: Peter wood – the ethical hacker

Peter WoodChief Executive Officer

First•Base Technologies LLP

[email protected]

http://firstbase.co.ukhttp://white-hats.co.ukhttp://peterwood.com

Blog: fpws.blogspot.comTwitter: @peterwoodx

Need more information?