Counterattack Turning the tables on exploitation attempts from tools like Metasploit. Matthew scriptjunkie Weeks
|
|
|
- Marjory Butler
- 10 years ago
- Views:
Transcription
1 Counterattack Turning the tables on exploitation attempts from tools like Metasploit Matthew scriptjunkie Weeks
2 Abstract In hostile networks, most security is aimed at preventing compromise. However, it is often possible for the intended victim to not only confuse and frustrate the attacker, but actually trade places and exploit the attacker. Vulnerabilities have already been shown in security tools such as Firesheep, Nessus, Cain and Abel, and Wireshark. This paper introduces vulnerabilities in Metasploit discovered through code analysis that result from assumptions about threat vectors. These include XSS and CSRF vulnerabilities in the msfweb interface that enable remote code execution from a malicious URL. The meterpreter controller has had directory traversal vulnerabilities, as well as the TFTP and FTP server modules and many scripts. Cross-platform payloads can be written in Ruby, rely on the Metasploit libraries, and take advantage of crossplatform code locations in Metasploit for persistence. Metasploit users can protect themselves from these attacks by using securely coded scripts or virtualization and other defense in depth techniques. Despite these releases, Metasploit still has one of the best track records from a vulnerability perspective; it is coded in a memory-safe language and thus avoids a constant stream of memory corruption vulnerabilities that other programs suffer from, and its source is open to critique.
3 Introduction Research on counterattacking, also known as aggressive self-defense, active defense or strike-back, has taken place for many years. Ranging from passive approaches to full remote exploitation, counterattacks have nevertheless often been considered ethically dubious or technically impractical. Although this paper will not discuss the ethical or legal issues behind counterattacks, it will show how launching attacks often exposes the attacker to intrusion. This paper will first present previous work followed by a description of attacks against specific tools and finally previously unreleased attacks against Metasploit. Previous work Popular tools to block, deceive, or merely gain information about attackers include the ubiquitous intrusion detection and firewall systems. Other passive approaches led to the development of honeypots and honeynets. Many antivirus firms and other researchers have run large honeynets to collect malware and attack signatures. Active defenses to exploit vulnerabilities of attack tools have also been demonstrated before. Weaknesses in the popular Linux security distribution Backtrack have led to a number of attacks, such as the sequence described by Rob DeGulielmo in his DefCon 17 presentation. Many security researchers have used vulnerabilities in exploit packs to gain information on attacks, botnets, and even the botmasters themselves. For example, work done by Paul Royal targeted operators of the exploit kits LuckySploit and UniquePack through XSS vulnerabilities in those kits. Billy (BK) Rios has demonstrated a counterattack against a Zeus botnet controller. Generic counterattacks Some techniques for counterattack are independent of the particular tool used. For example, if a honeypot hosted a Windows network share, an attacker that connected to the share would transmit information in the connection. An attacker using Windows would reveal in the SMB request his system name, domain name, and username. A counterattacker can force or at least prompt such a connection by embedding a link with a UNC path into a honeypot web page. Especially effective when the attacker is using Windows, the counterattacker can run the Metasploit smb_capture or smb_relay modules to get a password hash of the attacker to crack the attacker's password or even take over the attacker's system. In some situations, a counterattack can successfully mirror the initial attack. For example, a network security administrator may want to stage a counterattack against a worm infected system that is launching exploits to spread the worm. In a targeted attack, the attacker will probably not allow his system to be vulnerable to the exploit he is using, however in a worm outbreak, an infected system will probably be vulnerable, since it was infected by the worm in the first place. In this situation, the counterattacker will need the ability to use the worm's exploit. For example, against a worm spreading using the MS vulnerability, a counterattacker could use Metasploit to exploit the same vulnerability the worm initially used to gain control of the offending system and shut down the worm.
4 Security tools Many of the most widely used security tools have had vulnerabilities opening them up to attack. Examples can be found in Nmap, Firesheep, Nessus, Cain & Abel, Wireshark, and Metasploit. Nmap Nmap, possibly the most popular network exploration tool or port scanner, is a classic tool of both network administrators and hackers alike. Hackers commonly run an Nmap scan against a host to gain information about operating system and running services before they can prepare an attack. The Nmap developers have a good track record with no vulnerabilities reported in the NVD (National Vulnerability Database) or OSVDB (Open Source Vulnerability Database) despite the fact that Nmap is a large, popular network program written in C++. Counterattacks against Nmap without a 0-day will be limited to deception and denial of service. One option is to use port knocking or similar mechanisms to hide a port so that Nmap does not detect it. Another option is to run a tar pit to slow down Nmap scans once detected. A tar pit is a firewall setting that will accept a connection, then advertise a zero-byte TCP receive window. A tar pit will have little effect on the basic SYN scan other than making the port appear open when it has nothing meaningful running on it. However, when Nmap or other scanners open a connection to run version detection scripts, the connection will be frozen in an endless series of keepalive packets. The attacker will only be wasting time and system resources until he gives up or the connection times out. An aggressive scan that usually completes in seconds or a few minutes may instead take hours to complete and will have almost no useful information. A counterattacker can also make large numbers of ports appear to be open. If every port is open or if most of them are tar pits, an Nmap scan will consume a large amount of time and resources on an attacker's system, and it may crash Nmap. The current development tree of Nmap has a patch for this crash, limiting the number of concurrently running scripts, but it had not been incorporated into a stable release when this paper was written. Firesheep Firesheep is a recently developed specialized Firefox addon to perform session hijacking by sniffing cookies of specific websites, such as Facebook. Many previous tools have been able to do this, but Firesheep's complete ease of use and wide press coverage have pushed it to the forefront. Other tools are completely passive, but when Firesheep sees a new cookie, which generally represents a new logged-on user, it will test that cookie. Firesheep makes requests to Facebook to see whether the token is a valid session ID and extract the picture and name of the user it can hijack. It is therefore possible to detect a running Firesheep instance on the same open or WEP encrypted wireless network by sending out a request with a bogus cookie and listening for further requests with the same cookie. If another system sends out such a request, it can be identified as attempting to hijack sessions, probably with Firesheep. The Blacksheep Firefox addon performs this. Another program, Fireshepherd, sends out a request with a long string of random data as the cookie, which will cause Firesheep to crash.
5 Nessus Nessus is a commercial vulnerability scanner that is one of the most widely used security tools. It can run thousands of tests to identify vulnerabilities from the network. Although it has a good track record, it also has suffered a number of vulnerabilities, such as CVE , XSS in the Nessus Web Server, or CVE , directory traversal. Cain and Abel Cain and Abel is a popular windows freeware tool that performs many attacks on security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms that include many different password recovery techniques, ARP poison routing, and service manipulation. It is a closed-source application and has suffered a number of vulnerabilities, for example CVE : Multiple buffer overflows in Cain & Abel before 2.67 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via (1) an IKE packet with a large ID field that is not properly handled by the PSK sniffer filter, (2) the HTTP sniffer filter, or the (3) POP3, (4) SMTP, (5) IMAP, (6) NNTP, or (7) TDS sniffer filters; and more recently CVE : Stack-based buffer overflow in the RDP protocol password decoder in Cain & Abel and , and possibly earlier, allows remote attackers to execute arbitrary code via an RDP file containing a long string. A counterattacker could send exploits for these vulnerabilities at an attacker who had Cain & Abel's sniffer turned on. Wireshark Wireshark is a packet-sniffing protocol analyzer that is useful for debugging network issues, but can also be used to sniff and view network traffic of others, listening to VoIP calls, and viewing passwords or any other sensitive content that is not properly encrypted. Wireshark has had a rough time with vulnerabilities. Dozens of security flaws have been documented. To be fair, it has faced possibly the most difficult job of the listed programs, as the Wireshark Security Wiki explains: Recent automated code inspections showed a much lower defect rate compared to other known open source programs (the defect rate of closed source programs is not known but may be even higher). Unfortunately most bugs found in the Wireshark code are security related so they are mentioned in the security bulletins. In most programs, only small sections of code work directly with "outside" data (e.g. from a file or network). By focusing on these small sections during code reviews, developers can eliminate most security problems. Wireshark is different. The vast majority of its code base deals directly with data from the "outside", so a code review on the relevant parts would cover most if not all of the complete Wireshark code. Running "wc -l epan/dissectors/*.[ch]" returns over 1,900,000 lines of code that's expected to handle fresh-off-the-wire data! Auditing all of this would be a huge effort, and may not guarantee success. Wireshark is implemented in ANSI C, which is vulnerable to security problems like
6 buffer overflows (compared to more securely designed languages like Java or C#). The Wireshark team has taken security vulnerabilities very seriously, and responded by implementing many improvements. One of the improvements is an automated build process that includes fuzz testing after each checkin. However, the system can have negative effects, as it broadcasts security issues before they are fixed. When a fuzz test causes a crash, a file containing the packets that caused the crash are posted online, ed to a public distribution list, and can serve as a proof of concept for an attack. In contrast, other popular open source projects like Firefox will mask files that can serve as the basis for an attack at least until a patch or a workaround is ready. Another issue with Wireshark in practice is the difficulty of keeping Wireshark updated. Wireshark does not automatically update or check for updates, and installs generally become outdated in a matter of weeks or months. Furthermore, on Linux, when Wireshark is installed via a distribution software center, so that it can be automatically updated, the distribution often does not have the latest version. For example, Ubuntu, the most popular Linux distribution, generally lags behind on updates. Wireshark download page behind Ubuntu's Synaptic package manager showing an old, vulnerable version of Wireshark The underlying problem, as admitted, is the use of a non-memory safe language like C that makes these attacks possible. If Wireshark were programmed in a memory-safe language such as, for example, Java, it would not suffer from these memory corruption vulnerabilities. The real elephant in the room of application security is that a huge majority of the vulnerabilities of not only Wireshark, but also more commonly exploited applications such as browsers and PDF viewers, could have been eliminated with the use of a memory-safe language. Metasploit Metasploit was programmed in Ruby, which does not suffer from the memory corruption issues of C. It exposes very little memory corruption attack surface, and almost none of it lies in the actual Metasploit code, residing instead in libraries like OpenSSL. Vulnerability discovery is therefore unlikely with standard fuzzers. Instead, finding vulnerabilities requires manual code
7 analysis, although a counterattacker is not completely on his own. For example, web vulnerability scanners can be used. (although none were used in this research) The vulnerabilities released in this paper are examples of common vulnerability classes found against many other applications, especially webapps. Msfweb vulnerabilities The first two vulnerabilities released here are found in the msfweb interface. This interface, the open-source web interface, has been included in some form in Metasploit since about However, in late 2009 support for the interface was dropped. The first vulnerability is a cross-site scripting vulnerability. Msfweb provides a payload generating capability that will generate payloads based on options that a user provides. The msfweb payload generation page After the form is submitted, msfweb will generate, encode, and display the payload in the format given inside a HTML textarea tag. Although the only options for format under the drop box are C, Ruby, Perl, Javascript, and Java, the msfweb server also accepts raw as a format parameter. A counterattacker can reflect any content into the output page from the CMD option of the generic command execution payload combined with the generic/none encoder and raw output format. Cross-site scripting can be obtained by sending a closing textarea tag followed by a script tag; i.e. </textarea><script>alert(1)</script>. The parsing logic will not echo content following a comma or equals sign or a semicolon. So to execute useful code, this exploit concatenates String.fromCharCode calls to decode and execute a stager that downloads and executes the main Javascript stage from the attacker's server. This XSS vulnerability provides control over the msfweb instance. To turn this control into remote code execution, an exploit can use a command injection technique or a consolebased technique that will execute Ruby code from within the msfweb process. The exploit presented here uses the second. The main stage will first obtain a new console by making a request to /console/. This request will create a new console, give it a number, and redirect to the URL /console/index/n where N is the index of the new console; for example /console/index/3. The script will then issue console commands to run a handler for a bind meterpreter, verifying that these commands complete correctly. Once the meterpreter session is established, it will download a file to a temporary directory and use the loadpath command to execute the Ruby code in the file. This code execution technique may seem overly roundabout, but it functions cross-
8 platform in Linux and Windows systems without relying on other system commands or functions. It will also work even when the attacker is behind a firewall and when the attacker does not have privileges to run a TFTP server. The second vulnerability in msfweb is CSRF. Msfweb does not verify that requests originated from itself via any kind of CSRF token or other check. If a counterattacker can convince the attacker to view a page, he can force the attacker to make any request to the msfweb instance. Even though the process of launching an exploit or other module from the user's perspective is a multi-step approach of sending options to a series of forms, until the Launch Exploit (or Launch Auxiliary) command is given, the server is stateless. Each form post includes all options already specified. The final form post to launch the module holds all the information needed to launch the module. Furthermore, msfweb accepts parameters in either the POST body or the URL. Therefore a single CSRF request can launch a module, and it can do that without a form, only using an image tag easily embedded in many different places, such as web forums and s. A number of Metasploit modules call on external utilities to gain information or interact with other tools and place options that the user provides into the command line. Examples include the wifi fuzzers and the sqlmap auxiliary module. The sqlmap module simply creates a command line to launch the sqlmap program and runs it through a shell. It allows the user to add arbitrary arguments, which it simply appends to the command. This allows the module to run any other commands by inserting a pipe ( ) ampersand (&) or semicolon (;) before the other command. In the exploit released here, a CSRF request launches the sqlmap module to create and run an arbitrary command line following a semicolon. To be effective, a counterattacker must use a command that will function on the attacker's OS. Directory Traversal Vulnerabilities Many scripts in the framework extract various items of information from the exploited host and save it in a subdirectory of the user's home directory. To organize the data across different hosts, the directory name often includes the computer name. Unfortunately, until recently, these were not checked for directory traversal sequences. Therefore, if an attacker ran one of these scripts, the counterattacker could control both the location and, depending on the script, the contents of a file to be written to the attacker's machine by using a computer name including sequences like "../../". Many scripts perform or can perform this type of logging, such as arp_scanner, domain_list_gen, dumplinks, enum_chrome, enum_firefox, event_manager, get_filezilla_creds, get_pidgin_creds, packetrecorder, persistence, search_dwld, and winenum. Payloads Many options exist for payloads on a Metasploit exploit, although care must be taken if the OS and architecture of an attacker cannot be reliably determined. Metasploit runs on everything from most Windows versions to Linux, OS X, and the iphone. A counterattacker can only assume the basic dependencies of Metasploit and Metasploit itself are present. Knowing this, counterattackers can write cross-platform payloads in Ruby. Alternatively, after gaining code execution, shellcode can extract native or Java payloads depending on the target OS and architecture. Metasploit already generates Ruby bind and reverse shells for command injection bugs, but these tend to be unreliable as they are optimized for a short command line. For cases
9 where an exploit can run larger Ruby shellcode, more reliable shells have been provided. In addition to catching errors, and re-listening for connections in case a shell process dies, the payloads will run in a new thread so that the exploited process does not freeze waiting for it to complete. Counterattackers can obtain persistent access to an attacker in any OS by placing code in a subfolder of the.msf3/modules/ subdirectory of the user's home directory that will be automatically loaded when the framework starts. Metasploit will load all Ruby code inside the subfolders named exploits, auxiliary, encoders, nops, and payloads to support personally developed modules without affecting the main module tree. Another place persistence can be achieved is by placing commands or Ruby code in the file ~/.msf3/msfconsole.rc which Metasploit runs as a resource file when the framework is started. If the exploited process has privileges to change the main Metasploit code, it can add a back door, or even relocate the subversion root if the counterattacker wants to maintain access by subverting the update process. And of course, counterattackers can use any platform-specific mechanism to maintain access. Payloads for use against Wireshark encounter some of the same difficulties as payloads for use against Metasploit. Wireshark compiles and runs on many different operating sytems and architectures. Cross-platform exploits are extremely difficult to create due to differences in system calls, and even across different versions of the same OS, structures like heap structures differ widely as well as general memory layout. Defenses The preferred method of defending against any of the exploits discussed in this paper is to patch the vulnerabilities discussed. Of course 0-day vulnerabilities may still remain. Using a dedicated laptop or VM for penetration testing tasks provides a degree of defense in depth, however some tools such as wifi injection modules may not function from a VM. Likewise, limiting privileges can also be effective although running client-side exploits may require more privileges. For example, Metasploit can run HTTP, DNS, DHCP, FTP, TFTP, SMB, and RPC servers, but most of these modules require root privileges on Linux or UNIX systems to open privileged ports. Running most Nmap scans also requires root privileges. A counterattacker should isolate vulnerable code used in counterattacks and attackers' sessions in dedicated honeypot VMs, but the preferred method is using bogus services and emulated meterpreter sessions in honeypots to avoid giving a real shell to an attacker. Conclusion Counterattacks to deceive, crash, exploit, or just get information on attackers have been created for use against many different attacks and tools, such as exploit packs, Nmap, Firesheep, Nessus, and now Metasploit. Tools that are coded in a memory-safe language have some of the best track records from a vulnerability perspective, avoiding a the memory corruption vulnerabilities that other programs suffer from. Tools like Metasploit also benefit from being open-source. Although, as the example of Wireshark shows, open-source does not imply errorfree, it provides an atmosphere more conducive to external aid in finding and fixing vulnerabilities. Metasploit's large library set allows a counterattacker to create reliable, crossplatform payloads and maintain persistent access on the disk.
10 Works Consulted Aggressive Network Self-Defense. Neil Wyler, Bruce Potter, Chris Hurley. 26 February A very large malware honeynet. Panda Research Blog. 19 December Accessed 10 December Con Kung-Fu Defending DefCon. Rob DeGulielmo. 30 July National Vulnerability Database. NIST. Accessed 8 December Nmap Changelog. David Fifield. Accessed 11 December One-in-four hackers runs Opera to ward off other criminals - Security firm bamboozles hacker toolkit operators into divulging info. Gregg Keizer. 20 August ward_off_other_criminals Oxid.it Cain & Abel. Massimiliano Montoro. Accessed 15 December Security The Wireshark Wiki. Accessed 8 December Turning the Tables. Billy (BK) Rios. Accessed 2 January Open Source Vulnerability Database. Accessed December
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Summary of the SEED Labs For Authors and Publishers
SEED Document 1 Summary of the SEED Labs For Authors and Publishers Wenliang Du, Syracuse University To help authors reference our SEED labs in their textbooks, we have created this document, which provides
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
How to hack a website with Metasploit
How to hack a website with Metasploit By Sumedt Jitpukdebodin Normally, Penetration Tester or a Hacker use Metasploit to exploit vulnerability services in the target server or to create a payload to make
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Information Security. Training
Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)
WEB APPLICATION HACKING Part 2: Tools of the Trade (and how to use them) Jonathan Eddy September 27, 2013 Last Updated September 27, 2013 MAPPING THE APPLICATION 4 2 ENUMERATING CONTENT AND FUNCTIONALITY
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Evaluation of Penetration Testing Software. Research
Evaluation of Penetration Testing Software Research Penetration testing is an evaluation of system security by simulating a malicious attack, which, at the most fundamental level, consists of an intellectual
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed
Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security
Security+ Supported Labs - V1 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles -
April 11, 2011. (Revision 2)
Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Audience. Pre-Requisites
T R A N C H U L A S W O R K S H O P S A N D T R A I N I N G S Hands-On Penetration Testing Training Course About Tranchulas Tranchulas is a multinational information security company having its offices
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Course Title: Course Description: Course Key Objective: Fee & Duration:
Course Title: Course Description: This is the Ethical hacking & Information Security Diploma program. This 6 months Diploma Program provides you Penetration Testing in the various field of cyber world.
VMware: Advanced Security
VMware: Advanced Security Course Introduction Course Introduction Chapter 01 - Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge ESX Networking Components How Virtual Ethernet Adapters
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
Attack Frameworks and Tools
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks
CIT 480: Securing Computer Systems Vulnerability Scanning and Exploitation Frameworks Vulnerability Scanners Vulnerability scanners are automated tools that scan hosts and networks for potential vulnerabilities,
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
2016 TÜBİTAK BİLGEM Cyber Security Institute
2016 Revision 5.0 2016 TÜBİTAK BİLGEM Cyber Security Institute 1 ... 3 1. Information Security Awareness for End Users... 4 2. Information Security Awareness for Managers... 5 3. Social Engineering: Attack
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES By Michael Crouse Dr. Errin W. Fulp, Ph.D., Advisor Abstract The increasingly high volume of users on the web and their use of web
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
June 2014 WMLUG Meeting Kali Linux
June 2014 WMLUG Meeting Kali Linux "the quieter you become, the more you are able to hear" Patrick TenHoopen Kali Linux Kali Linux is a free and open source penetration testing Linux distribution designed
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
