* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download SyS64738: [email protected] Agris Krusts: agris@zone
Survey
Document related concepts
Transcript
Attacchi alla infrastruttura Luigi D’Amato – Lugano 24 Settembre 2010 Hackers and such … Whitehat Hackers Good technical skills, good programmers, enjoy the intellectual challenge but no damages on systems. Knowledge is free for everyone. Blackhat Hackers Good technical skills and programmers but used to steal information, cause damages, and control the attacked system. Knowledge is for a small elite. Crackers/Defacers/Script Kiddies People with low technical and programming skills, usually teenagers, that use tools written by other people to cause damages and for self amusement. Phreakers Active on hacking telephone lines, originally mostly oriented to hardware hacking but nowadays turning to the digital side (VoIP). Collecting information on our target The most critical phases revolve around the accessibility of various online resources such as: Internet Service Registration: Registration and maintenance of IP addresses information Domain Name System: Registration and maintenance of host naming Naming Conventions: How an organization encodes or categorizes the name of machines or services Email Systems: Info contained inside email headers Search Engines: For retrieving material related to organizations and/or their employees Website Analysis: Public information that may pose a risk to security Internet Service Registration Internet Service Registration - Regional Internet Registries (RIR): APNIC (Asia-Pacific Network Information Center) ARIN (American Registry for Internet Numbers) LACNIC (Latin American and Caribbean Internet Addresses Registry) RIPE NCC (Réseaux IP Européens Network Coordination Centre) Internet Service Registration 2 Whois There are two kinds of Whois: 1) Network service-based. It provides details of network management data; includes information such as the contact provider of the network numbers and the company leasing the address space. 2) Name service-based. It provides a number of details about a domain: - Registrant of the domain - Street address of the domain - Contact number for the registrant http://www.internic.net/whois.html --- non military http://www.uwhois.com --- non military http://whois.nic.mil --- military Zone Transfer DNS servers need to exchange data to allow replication between primary DNS (SOA) and secondary server. This is performed through “Zone transfers” - Any client system can try to query a DNS server for a “zone transfer”. - A bad configured DNS server will respond to the client query and provide a list of all the information about the queried domain. - An attacker can obtain a list of all named hosts, sub-zones and associated IP addresses. - A zone transfer is a very effective method of obtaining a lot of information about an organization’s network. There are 2 ways to try a “zone transfer”: Zone Transfer 2 1) Direct zone transfer query Zone Transfer 3 2) Indirect zone transfer query: http://www.watchmouse.com/en/dns_dig.php Naming convention It is important to analyze the names used to define each service.The naming convention used provides valuable insights into the use and position of hosts within an organization. Common naming convention includes: Functional information (e.g. FW.acme.com for firewall, OWA.acme.com for exchange Web-mail interface, webdev.acme.com for developer webserver, etc.) Network location information (fwDMZ.acme.com) Physical location information or common location shorthand (e.g. NY - New York, LA - Los Angeles, etc.) Operations system information (e.g. the Microsoft Windows 2003 as w2k3) Hardware/model information (Cisco2611.acme.com) Common sequences to identify servers (jupiter.acme.com, moon.acme.com) Users name like (pc-bob.acme.com, smith-pc.acme.com) Naming convention 2 IBM example: Name server: ibm.com nameserver = ns.watson.ibm.com ibm.com nameserver = ns.almaden.ibm.com ibm.com nameserver = internet-server.zurich.ibm.com ibm.com nameserver = ns.austin.ibm.com Function Geographical site @ Email info gathering A lot of information about an organization can be gathered through analysis of its e-mail system. Email headers provide insight into internal server naming, IP addresses, possible content filtering or anti-virus solutions, smtp server type, patch levels and even the version of the client’s mail client. How can we get this info ? Through search engines or by sending an email to nonexistent email addresses… And why? …because returned error notification e-mails contain headers! Email info gathering 2 Hiding your traces It is mandatory, for an attacker, to cover as much as possible his traces during all the phases of the attacking process, including the simple web based information gathering. In order to do so, several methods are available. Proxies Strategic shell bouncing TOR Strategic shell bouncing Your server The shell The hacker IP/Port Scanners IP scanners are designed to scan for active hosts or active services on a network. Port Scanners instead, are designed to search a network host for open ports. They are often used by administrators to check the security of their networks and by hackers to compromise it. WINDOWS Superscan - www.foundstone.com Nmap - www.insecure.org Advanced IP Scanner - www.famatech.com Advanced Port Scanner - www.famatech.com LINUX Nmap - www.insecure.org Synscan - www.bindshell.net/tools/synscan Hping - www.hping.org Knocker - knocker.sourceforge.net Exploits / 0day What is an exploit? An exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug or vulnerability in order to get unintended or unanticipated behavior out of computer software, hardware, or something electronic (usually computerized). This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack. Password tools Login sessions Hydra - www.thc.org Brutus - www.hoobie.net/brutus/ Buruts.pl - www.0xdeadbeef.info Password Cracking John the Ripper - www.openwall.com/john MDcrack - mdcrack.openwall.net L0phtcrack - download.insecure.org/stf/lc5-setup.exe Attacking the users The techniques used nowadays to perform attacks against users are: • Web Browser attacks • Mail Client attacks • Personal Application attacks (multimedia players, office suites, etc) • Open shares • Trojanized USB sticks/CD/DVD In conjunction with social engineering techniques. The first three kind of attacks imply the use of specific vulnerabilities that can change over the time and often most of them being 0day and unpatched. Illegal Market •Eleonore Exploits Pack v1.2 •Price: -latest version is USD 700. For an additional cost of USD 50 provides access to their crypter. -Exploit: -MDAC, MS009-02, Telnet - Opera, Font tags - FireFox, PDF collab.getIcon, PDF Util.Printf, PDF collab.collectEmailInfo, DirectX DirectShow and Spreadsheet. Illegal Market •Barracuda Botnet v3.0 - This is a crimeware with two versions of marketing, the Full version at a cost of USD 1600 and the Lite version at USD 1000. -Module DDoS (HTTP GET / POST flood, UDP flood, ICMP flood, TCP flood, IP Spoofing) at a cost of USD 900. •Email Grabber module that collects email addresses stored on the zombie. Its value is USD 600. •Proxy Module, allows to increase the number of simultaneous connections for a more "efficient" sending spam. Its value is USD 500. •Module PWDGRAB. Clearly oriented to the theft of private information. The value is USD 500. •Module SSLSOCKS. This module is in its beta stage and can build a VPN "through the botnet. The price is USD 500. Q& A •Q&A. . . •Thank you for your attention!