Hacking Techniques & Intrusion Detection



Similar documents
How-to: DNS Enumeration

Glossary of Technical Terms Related to IPv6

Chris Gates

Part I - Gathering WHOIS Information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Networking Domain Name System


ECE 4321 Computer Networks. Network Programming

Penetration Testing with Kali Linux

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015

How to Add Domains and DNS Records

Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.

Copyright

The Domain Name System

Networking Domain Name System

1. LAB SNIFFING LAB ID: 10

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Hacking Techniques & Intrusion Detection

How To Guide Edge Network Appliance How To Guide:

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

DNS Resolving using nslookup

Switching Your DNS WiredTree

Basic DNS Course. Module 1. DNS Theory. Ron Aitchison ZYTRAX, Inc. Page 1 of 24

Learn Ethical Hacking, Become a Pentester

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Ethical Hacking Course Layout

Lecture 5: Network Attacks I. Course Admin

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Copyright International Business Machines Corporation All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

Understanding DNS (the Domain Name System)

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12

- Domain Name System -

Penetration Testing Automation System

Understand Names Resolution

gathering Dave van Stein 9 april 2009

Penetration Testing 2014

IBM. Vulnerability scanning and best practices

Course Content: Session 1. Ethics & Hacking

Tactical Exploitation the other way to pen-test. hdm / valsmith

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Hacking Techniques & Intrusion Detection

Installing and Setting up Microsoft DNS Server

Networking Domain Name System

A fresh new look into Information Gathering. Christian Martorella IV OWASP MEETING SPAIN

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Windows Active Directory. DNS, Kerberos and LDAP T h u r s d a y, J a n u a r y 2 7, 2011 INLS 576 Spring 2011

January 2011 Maltego 3 User Guide - Transforms Version 3.0

Application Protocols in the TCP/IP Reference Model

CS3250 Distributed Systems

Detecting rogue systems

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System

Securing Your Network. The Art of Attack & Penetration

DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved

what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference

3. The Domain Name Service

DNS. Computer Networks. Seminar 12

Domain Name System. Overview. Domain Name System. Domain Name System

How to use the UNIX commands for incident handling. June 12, 2013 Koichiro (Sparky) Komiyama Sam Sasaki JPCERT Coordination Center, Japan

Introduction to Network Operating Systems

DNS Root NameServers

Ethical Hacking: The Value of Controlled Penetration Tests

Hands-on Hacking Unlimited

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, DNS & IPv6.

How To Use The Domain Name Server (Dns)

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

Internet Security [1] VU Engin Kirda

Intelligence Gathering. n00bpentesting.com

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

McAfee Certified Assessment Specialist Network

Security of IPv6 and DNSSEC for penetration testers

Domain Name System (DNS) RFC 1034 RFC

DNS Domain Name System

Introduction to Network Penetration Testing

Chapter 9: Name Services. 9.1 Introduction 9.2 Name services and the DNS 9.3 Directory services 9.6 Summary

Description: Objective: Attending students will learn:

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Section 1 Overview Section 2 Home... 5

THE DOMAIN NAME SYSTEM DNS

Web App Security Audit Services

Leveraging Best Practices for SolarWinds IP Address Manager

Footprinting and Reconnaissance Tools

APNIC IPv6 Deployment

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

The Application Layer. CS158a Chris Pollett May 9, 2007.

How to Configure the Windows DNS Server

Fasthosts Internet Parallels Plesk 10 Manual

Transcription:

Hacking Techniques & Intrusion Detection Winter Semester 2012/2013 Dr. Ali Al-Shemery aka: B!n@ry

Footprinting Walking the trails to a target

Outline External Footprinting Identify External Ranges Passive, and Active Internal Footprinting Identify Internal Ranges Passive, and Active 3

External Footprinting

Identify Customer External Ranges The major goals of intelligence gathering during a penetration test is to determine hosts which will be in scope. Common techniques to identify: WHOIS searches on the domains and the ranges reverse DNS lookups DNS brute forcing 5

Passive Recon - WHOIS Lookups Determine TLD for the domain, and which WHOIS server contains the information we're after. WHOIS information is based upon a tree hierarchy. ICANN (IANA) is the authoritative registry for all of the TLDs. Middle East WHOIS lookup (registrar): RIPE NCC, http://www.ripe.net/lir-services/membersupport/info/list-of-members/mideast DEMO (whois) 6

Passive Recon - NetCraft Internet monitoring company that monitors uptimes and provides server operating system detection. Site Report returns information such as: IP address Name servers Reverse DNS Netblock owner DNS admin Domain registry DEMO 7

Passive Recon - URL(s) Extract list of URLs from a web page list-urls.py Search for files in a domain goofile.py FOCA DEMO 8

Online Tools Central Ops, http://centralops.net/ Wayback Machine: http://archive.org/ Zone-h Defacement Archive, http://zone-h.org/ Domain Tools, http://www.domaintools.com/ DNS Stuff, http://www.dnsstuff.com MX Toolbox, http://mxtoolbox.com RIPE, http://www.ripe.net/data-tools/db WHOIS, http://www.whois.com/whois/ WHOIS, http://www.whois.sc/ What Is My IP, http://www.whatismyip.com/ InterNIC, http://www.internic.net/ 9

Google for Pentesting Check Johnny Long s presentation @Blackhat Google Dorks, http://www.exploitdb.com/google-dorks/ Google Hacking Database (GHDB), http://www.hackersforcharity.org/ghdb Assignment #1: Write about 10 Google Dorks. 10

ShodanHQ ShodanHQ.com is a computer search engine. Examining the response of the devices it contacts on the Internet. Information gathered such as: Target OS, Web server software version Checks if default user/pass are being used Can identify webcam, firewalls, and VoIP devices Can identify network printers Need Help? www.shodanhq.com/browse Registration is required to make the most effective use of the site. 11

Active Footprinting Port Scanning Next Week 12

DNS Discovery Performed by looking at the WHOIS records for the domain's authoritative nameserver. Variations of the main domain name should be checked, and the website should be checked for references to other domains which could be under the target's control. 13

DNS Discovery DNS Types A Host s IP address. MX Host/domain s mail exchanger(s) NS Host or domain s name server(s) CNAME Host s canonical name allowing additional names or aliases SOA Authority for the domain SRV Service location record often used with Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP) RP Responsible person PTR Pointer to a canonical name, used for reverse lookups 14

Zone Transfers DNS zone transfer, also known as AXFR, is a type of DNS transaction. It is a mechanism designed to replicate the databases containing the DNS data across a set of DNS servers. Zone transfer comes in two flavors, full (AXFR) and incremental (IXFR). Tools commonly used: host, dig, and nmap DEMO 15

Reverse DNS Reverse DNS can be used to obtain valid server names in use within an organizational. There is a caveat that it must have a PTR (reverse) DNS record for it to resolve a name from a provided IP address. 16

Forward DNS Some call it DNS Bruteforcing Not only zone transfers! Discover additional host names that are not commonly known. fierce.pl dnsenum.pl dnsrecon.py DEMO 17

SMTP SMTP bounce back, also called a Non-Delivery Report/Receipt (NDR), a (failed) Delivery Status Notification (DSN) message, a Non-Delivery Notification (NDN) or simply a bounce, is an automated electronic mail message from a mail system informing the sender of another message about a delivery problem. Done by simply creating a bogus address (Blah_blah_address@target.com) within the target's domain. 18

SMTP Tools SMTP User Enumerator, smtp-user-enum smtp-user-enum.pl -M VRFY -U users.txt -t 10.0.0.1 SMTP Scan, smtpscan SMTP Relay Checker, smtprc Swiss Army Knife for SMTP, swaks Nmap NSE script, smtp-enum-users.nse DEMO (Online Central Ops): Central Ops (Email Dossier), http://centralops.net/co/ Manually 19

Banner Grabbing An enumeration technique used to glean information about computer systems on a network and the services running its open ports. Banner grabbing is used to identify network the version of applications and operating system that the target host are running. Usually performed on: HTTP, FTP, and SMTP Tools commonly used: Telnet, Nmap, and Netcat 20

SNMP Sweeps SNMP offer tons of information about a specific system. The SNMP protocol is a stateless, datagram oriented protocol. Unfortunately SNMP servers don't respond to requests with invalid community strings and the underlying UDP protocol does not reliably report closed UDP ports. This means that "no response" from a probed IP address can mean either of the following: machine unreachable SNMP server not running invalid community string the response datagram has not yet arrived 21

Web Application Discovery Identifying weak web applications can be a particularly fruitful activity during a penetration test. More on this when we reach Web Penetration Testing 22

Virtual Host Detection & Enumeration Web servers often host multiple "virtual" hosts to consolidate functionality on a single server. If multiple servers point to the same DNS address, they may be hosted on the same server. Tools such as Bing search can be used to map an IP address to a set of virtual hosts. 23

Establish External Target List Once the activities above have been completed, a list of users, emails, domains, applications, hosts and services should be compiled. Mapping versions Identifying patch levels Looking for weak web applications Identify lockout threshold Error Based Identify weak ports for attack Outdated Systems Virtualization platforms vs VMs Storage infrastructure 24

Internal Footprinting

Passive Footprinting If the tester has access to the internal network, packet sniffing can provide a great deal of information. Use techniques like those implemented in p0f to identify systems. # p0f o cap.txt -i eth0 -M -V -v -p -t 26

Identify Customer Internal Ranges Start by identifying the local subnet, then modify slightly to reach other subnets. Check routing tables of hosts. Most popular technique used is checking DHCP servers. 27

Active Footprinting We can perform all the external active footprinting techniques here. Port Scanning: Internal port scanning differs from external port scanning, because of the higher bandwidth available, and the ability to get more accurate response. Next Week 28

? Countermeasure Mitigation Remediation 29

Assingment(s) Assignment #2: Gathering information about a website from Google cache, is it an Active or Passive Recon? Assignment #3: Choose a target that you have permission to, maybe yourself and try to gather as much information found publicly as you can. Write a report about that. 30

SUMMARY We saw what is intelligence gathering The OSINT three What corporate info to gather What individual info to gather Understood the covert gathering types What is footprinting Difference between active and passive footprinting Main external and internal footprinting information resources How to use Google when performing intelligence gathering Discusses mitigation to footprinting 31

References Effective meetings, http://www.businessandthegeek.com/?p=112 Penetration Testing Standards, http://www.pentest-standard.org/ FOCA, http://www.informatica64.com/foca/ Foundstone, Johnny Long, Blackhat, Google Hacking for Penetration Testers, Exploit-DB, Google Dorks, NetGlub, Paterva Maltego, WHOIS lookup references ICANN - http://www.icann.org IANA - http://www.iana.com NRO - http://www.nro.net AFRINIC - http://www.afrinic.net APNIC - http://www.apnic.net ARIN - http://ws.arin.net LACNIC - http://www.lacnic.net RIPE - http://www.ripe.net, RIPE NCC SensePost BiLE Suite, http://www.sensepost.com/labs/tools/misc List of DNS Record Types, http://en.wikipedia.org/wiki/list_of_dns_record_types 32