gathering Dave van Stein 9 april 2009



Similar documents
Chris Gates

A fresh new look into Information Gathering. Christian Martorella IV OWASP MEETING SPAIN

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

ITEC441- IS Security. Chapter 15 Performing a Penetration Test


Ethical Hacking Course Layout

Si no quieres que sepa tu nombre, por que llevas el DNI en la frente? Christian Martorella CISSP, CISA

Don t scan, just ask A new approach of identifying vulnerable web applications. 28th Chaos Communication Congress, 12/28/11 - Berlin

Healthcare Information Security Governance and Public Safety II

NETWORK PENETRATION TESTING

IDS and Penetration Testing Lab ISA 674

Honeypot that can bite: Reverse penetration

Vinny Hoxha Vinny Hoxha 12/08/2009

WEBSITE PENETRATION VIA SEARCH

Kerem Kocaer 2010/04/14

Footprinting and Reconnaissance Tools

Ethical Hacking as a Professional Penetration Testing Technique

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

HackMiami Web Application Scanner 2013 PwnOff

Pwning Intranets with HTML5

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

SHODAN for Penetration Testers. Michael theprez98 Schearer

Penetration Testing 2014

April 11, (Revision 2)

The Power. Chema. of FOCA 3

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Don t Spill Your Candy in the Lobby

Keywords Penetration Testing, Pen-Test, Kali Linux, BackTrack, The Harvester, Whois, Webshag, SQL Injection, Hackers. Open Source

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

Penetration Testing. Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014

Vulnerability Assessment and Penetration Testing

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

by Debasis Mohanty (Orissa, India)

IDS and Penetration Testing Lab ISA656 (Attacker)

Hacking Techniques & Intrusion Detection

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

The Top Web Application Attacks: Are you vulnerable?

Targeted attacks: Tools and techniques

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

How-to: DNS Enumeration

Web Application Report

An Introduction to Network Vulnerability Testing

Client logo placeholder XXX REPORT. Page 1 of 37

The All-In-One Browser-Based Document Management Solution

Metasploit The Elixir of Network Security

Web Applications The Hacker s New Target

(WAPT) Web Application Penetration Testing

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Joomla Security Report

Penetration Testing Service. By Comsec Information Security Consulting

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Computer Security and Penetration Testing. Chapter 2 Reconnaissance

Tenable for CyberArk

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Bust a cap in a web app with OWASP ZAP

Is the Scanning of Computer Networks Dangerous?

Course Content: Session 1. Ethics & Hacking

Web Penetration Testing with Kali Linux

Lab 9: Pen Testing (NESSUS)

ASK PC Certified Information Systems Security Expert - CISSE

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Reconnaissance CHAPTER 7 CHAPTER OVERVIEW AND KEY LEARNING POINTS INTRODUCTION INFORMATION IN THIS CHAPTER

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Rational AppScan & Ounce Products

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Evaluation of Google Hacking

Certified Ethical Hacker (CEH)

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

External Network Penetration Test Report

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

June 2014 WMLUG Meeting Kali Linux

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Web Application Security

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

Additional details >>> HERE <<<

McAfee Certified Assessment Specialist Network

WordPress Security Scan Configuration

Trend Micro KASEYA INTEGRATION GUIDE

Advanced Event Viewer Manual

Penetration Testing //Vulnerability Assessment //Remedy

SANS Dshield Webhoneypot Project. OWASP November 13th, The OWASP Foundation Jason Lam

Integration Guide. Help Desk Authority, Perspective and sl

Hunting for Indicators of Compromise

Penetration testing & Ethical Hacking. Security Week 2014

Build Your Own Security Lab

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith

Transcription:

Modern information gathering Dave van Stein 9 april 2009

Who Am I Dave van Stein 34 years Functional tester > 7 years Specializing in (Application) Security Testing Certified Ethical Hacker

Agenda Goal of the presentation What is Information Gathering? Domain scanning Search engine abuse Other tools Some Social Engineering Remedies Conclusions

Goal of this presentation Give insight in amount of information anonymously available on internet about your system (and users) Give insight in the amount and possibilities of tools freely available

Intermezzo: How to hack Identify entrypoint Gain access Secure access Do stuff Clear up the mess Come back another time (simplified procedure)

Information Gathering Information gathering scans for: Domains and subdomains IP adresses Applications and technologies Hotspots (known vulnerabilities) Usernames and passwords Sensitive information Not only identifying risks, but also risk on exposure and exploiting

Passive Reconnaissance Reconnaissance: Information gathering, fingerprinting Gaining information about a target Passive Without making contact with target No direct scanning, no intrusion No logging and no alarm triggering!

Sources of information Public records WHOIS: information about owner DNS : information about IP adresses Necessary for network functionality Search engines Often little restrictions on websites Cache all information gathered

Tools What do you need? Webbrowser Internet access Creativity Advanced and Automated scanning: Specialized (offline) Tools

Classic Domain Scanning Steps involved: Get network information with ping and traceroute Get DNS information with WHOIS and LOOKUP Do DNS zone transfer for subdomains Download website for extra info Scan servers Problems: DNS zone transfers often not authorized Active connection with target => detectable

Modern Domain Scanning Various websites Anonymous Combination of techniques Sort results for nice presentation Search engine tweaking Additional information linked to domain Some examples

Domain Scanning: ServerSniff Server Sniff NS reports Domain reports Subdomains Various (trace)routes Various ping types Shows robots.txt Anonymous!

Domain Scanning: Server Sniff

Domain Scanning: Robtex Domain Swiss Army Knife Provides ALL information linked to a domain

Domain scanning: Robtex

Domain Scanning on-the-fly Passive Recon (Firefox add-on)

Domain Scanning: Live search Finds subdomains with IP:x.x.x.x

Live search automated: Webshag

Other tools Spiderfoot / Wikto Combine DNS / Google / Live Search / Yahoo Subdomains Directories IP s Email adressess Usernames Systems in use

Maltego Intelligence and forensics tool Connects many different sources of info Represents in graphical way Very extensive capabilities Too much to cover in this presentation http://www.paterva.com/maltego

Modern Domain Scanning Anonymous Both online and offline Highly automated Graphical network mapping in less than 10 minutes! Lots of additional information

Google Advanced search filetype: (or ext:) Find documents of the specified type. E.g. PDF, XLS, DOC intext: The terms must appear in the text of the page. intitle: The terms must appear in the title of the page. inurl: The terms must appear in the URL of the page.

Google Hacking Database www.johnny.ihackstuff.com (edit: http://johnny.ihackstuff.com/ghdb.php) Collection of queries for finding interesting stuff Regular updates

GHD applications Goolag scanner Goolag Scanner is a Web auditing tool. It works by exploiting data- retention practices of popular search engines. Contains Google Hacking Database Automated Google queries Automated result interpretation Single host or general scan

Goolag scanner

More applications Modern vulnerability scanners use GHD: IBM Rational Appscan Acunetix Vulnerability Scanner Others Several Firefox plug-ins for on-the-fly scanning

Google Hacking Database Possible results of GHD: Identify systems in use (including version) Identify known exploits Locations of sensitive information User-id s & passwords Logging files Many other things

Yahoo search: file explorer File explorer for the web

Yahoo search: file explorer Examples

Other tools Metagoofil : extract metadata from documents on website User names, server names, path locations, sofware + versions, MAC adresses (!) Wikiscanner : check comments made on Wikipedia by company or domain Company IP ranges Several Social Site extractors Linkedin, twitter, hyves, etc, etc, etc

Conclusions What search engines see, hackers can abuse Many tools are freely available Networks can be mapped with much detail in minutes Much information about your company, systems and users available on internet

Remedies (1/2) Limit access Allow search engines only to see what they need to see. Make sure unauthorized users are not able to look into or even see files they do not need to see. Force possible intruders to use methods that can be scanned and monitored. Use the tools of hackers Scan your systems with the tools hackers use and check the information that is found. Scan for error messages and other things that reveal information about the system and services and remove them. Check what spiders can see Use a spider simulator to check what spiders can see and if your application still functions correctly.

Remedies (2/2) Awareness Be aware of all possible sources of information. Create awareness among employees. Assume all information will possibly abused Clean documents Remove al metadata from documents before publishing. Audit frequently Keep your knowledge up-to-date and scan regularly for information that can be found about your systems or hire professionals do to it for you.

Interesting books on the subject