Attack Frameworks and Tools



Similar documents

Ethical Hacking Course Layout

Vulnerability Assessment and Penetration Testing

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Penetration Testing with Kali Linux

June 2014 WMLUG Meeting Kali Linux

CYBERTRON NETWORK SOLUTIONS

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

CEH Version8 Course Outline

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Certified Ethical Hacker (CEH)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Security of IPv6 and DNSSEC for penetration testers

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Audience. Pre-Requisites

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Application Security Testing

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Professional Penetration Testing Techniques and Vulnerability Assessment ...

VMware: Advanced Security

Penetration Testing Workshop

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Creation of Pentesting Labs

Internal Penetration Test

Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

FSP-201: Ethical Hacking & IT Security

SONDRA SCHNEIDER JOHN NUNES

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Exploiting Transparent User Identification Systems

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Build Your Own Security Lab

A Decision Maker s Guide to Securing an IT Infrastructure

Penetration Testing. ISACA - Atlanta

Hack Your SQL Server Database Before the Hackers Do

Evaluation of Penetration Testing Software. Research

Demystifying Penetration Testing

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Detailed Description about course module wise:

Course Content: Session 1. Ethics & Hacking

Web Application Security

Network Attacks. Common Network Attacks and Exploits

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Course Title: Course Description: Course Key Objective: Fee & Duration:

Maltego Tungsten as a collaborative attack platform BlackHat 2013

How to hack a website with Metasploit

Deciphering The Prominent Security Tools Ofkali Linux

Anatomy of an ethical penetration test

Information Security. Training

The Security Development Life Cycle

Thick Client Application Security

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

Enumerating and Breaking VoIP

Shellshock. Oz Elisyan & Maxim Zavodchik

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Attack Taxonomies and Ontologies

Metasploit The Elixir of Network Security

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

!!!!!!!!!!!!!!!!!!!!!!

INFORMATION SECURITY TRAINING CATALOG (2015)

Actuality of SMBRelay in Modern Windows Networks

Radware s Behavioral Server Cracking Protection

CS5008: Internet Computing

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC Council Certified Ethical Hacker V8

Malicious Network Traffic Analysis

Penetration Testing Report Client: Business Solutions June 15 th 2015

WHITEPAPER. Nessus Exploit Integration

Security Considerations White Paper for Cisco Smart Storage 1

[CEH]: Ethical Hacking and Countermeasures

A Selection of Network Penetration Test Tools

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

What is Web Security? Motivation

Tools for Attacking Layer 2 Network Infrastructure

Sample Report. Security Test Plan. Prepared by Security Innovation

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Penetration Testing Service. By Comsec Information Security Consulting

Application Security Testing. Generic Test Strategy

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Transcription:

Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet Technologies and Mobile Communication WS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München

Overview Introduction Overview of Tools Password Crackers Network Poisoners Network Security Tools Denial of Service Tools Concluding remarks 2

Introduction Network Security perhaps the most important aspect of communications in todays world How easy it is to attack a target system or network today? Tools automate most of the work From fingerprinting your target to attacking Knowledge requirements decrease day by day 3

Introduction The CIA Triangle Confidentiality Integrity Availability 4

Cain and Abel John the Ripper Hashcat Overview of the Tools Password Crackers Free Windows Only GUI Free Various Platforms Free Linux, OSX and Windows 5

ZARP Ettercap Overview of the Tools Network Poisoners Free Python Script Free Various Platforms 6

Nmap Metasploit Sqlmap Overview of the Tools Network Security Tools Free Various Platforms Free (Signup Required) Windows and Linux Free Python Script 7

LOIC HULK Overview of the Tools Denial of Service Tools Free Windows Only GUI Free Python Script 8

Password Crackers Attack: Confidentiality Crack passwords or keys Crack various kind of hashes Initially used to crack local system passwords like for Windows and Linux Have extended to include numerous kinds of hashes New versions are faster and use different kind of cracking methods GPU based password cracking also possible and is faster than CPU based Primarily: Brute forcing or Dictionary based attacks 9

Password Crackers Cain and Abel Windows based Widely used to crack Windows Passwords (LM Hashes and NTLM Hashes) Has built-in sniffer Can sniff web session passwords Can analyse SSH-1 or HTTPS traffic Needs: Rainbow tables for effective hash cracking Size of table impediment! However, this is an issue with all password crackers and related to password lengths and reverse hash lookups 10

Password Crackers John the Ripper Like Cain and Abel - Dictionary based and Brute force methods available Comes with various character sets Can crack numerous kinds of hashes Brute force can for obvious reasons take a huge amount of time Dictionaries could go up to petabytes Cracking time could be in excess of decades for even a 8 character password Normal machines: Impossible Solution: Good dictionaries? 11

Hashcat Password Crackers Like the previous tools However claims to be fastest password cracker with proprietary cracking algorithms Vs. Cain and Abel & John the Ripper - Offers various kinds of attacks 8 kinds of attacks Example: Combinator attack combine each word in dictionary to every other word in it Example: Hybrid attack Half of password from dictionary and rest from brute force HENCE, INCREASES EFFECTIVENESS OF A DICTIONARY A GPU Based cracker oclhashcat available - faster 12

Network Poisoners Attack: Integrity of the Network Can lead to loss of confidentiality and availability too Prime goal : ARP Poisoning Pose as another machine on the Network 13

Network Poisoners Once done: Pose as DNS Server Pose as DHCP Server Pose as the default gateway Perform Data Sniffing Man in the Middle Attacks (MITM) and a lot more Even HTTPS traffic is not safe (tool called SSLStrip) yet another tool that can be used without much insights. 14

Network Poisoners ZARP Suite of Poisoners Includes Sniffers Plans to be a central network poisoning/administration tool Can manage active sessions of poisoning/sniffing Still being developed 15

Network Poisoners Ettercap GUI available too! Plugins offer support for further complex attacks like: DNS Poisoning DHCP Poisoning 16

Network Security Tools Covers wide array of tools Most were created for vulnerability testing and easing the job of network administrators Today are used to test how secure a system is But are also infamous for their misuse by hackers 17

Network Security Tools Nmap Network Scanner A powerful tool to scan networks Used for (not exclusive list): OS fingerprinting Host Discovery Port Scanning 18

Network Security Tools Metasploit Framework A database of exploits Provides information about security vulnerabilities Goal: Aid in penetration testing and IDS signature development In the wrong hands: Can be used to exploit those same vulnerabilities with relative ease Exploits for almost every kind of system from Mac OSX to Windows to Linux to Android phones Has a GUI available too Armitage 19

Network Security Tools Metasploit Framework How easy it is? Select an exploit from the database Select a payload Decide upon an obfuscation or encoding scheme ANY EXPLOIT CAN BE ATTACHED WITH ANY PAYLOAD Types of exploits: Passive wait for targets to connect in and then try to exploit their systems Active target system attacked directly Autopwn feature tries to automatically exploit and inject itself into target system Makes life easy for an attacker! 20

Network Security Tools Metasploit Framework Problems? Exploits caught by anti-virus software (primarily of E-Mail providers) if not local systems anti-virus SPREADING THE PAYLOAD BECOMES DIFFICULT! Many exploits released after the vulnerabilities have been patched in software updates 21

Network Security Tools SQLMap Where the vulnerability exists SQL Injection Vulnerabilities Script checks possible SQL injection inputs on the Web application Vulnerability scanning Control Channel Data Channel Many such scanners exist like, JoomScan Joomla CMS Scanner WPScan Wordpress Scanner 22

Denial Of Service Tools Attacks : Availability Bandwidth Server Server Bandwidth 23

Denial Of Service Tools Attacks : Availability Other scenarios exist too Example: IPv6 DOS Attack Effects on Organziations: Loss of revenues in recent years Loss of user trust on organisations Recently: Christmas Day 2014 DOS Attacks on Playstation Networks and XBOX Live 24

Denial Of Service Tools LOIC Low Orbit Ion Cannon Hivemind feature Distributed Denial Of Service Favourite of Hacktivists Minimal knowledge of networks required Flood Multiple requests to the Server 25

26

Denial Of Service Tools HULK HTTP Unbearable Load King Generate unique requests every single time Additional random page names added Random Query Strings appended Source Client information changed 27

Conclusions Is it that easy to hack? Probably not Password crackers Require massive computing power Metasploit Payloads Detected by anti-virus software Patches before vulnerabilities published (usually) Nmap Fingerprinting Can be blocked by active monitoring SQL Injection becoming less common as developers become more aware Denial of Service still can occur Difficult to mitigate Used extensively by hactivist groups Unpatched systems and old websites may still be vulnerable 28

Conclusions However new tools are always available Example: Dendroid Android Hijack Tool Available/Leaked on the Deep Web with ease Simple web based interface Patch might still take time to come Google not patching older Android OSs More users becoming aware of.onion,.i2p, etc domains Once again: Ease of use and easy availability leads to anyone using the tools Black hat community will always have new tools Normal users do not need massive know-how to carry out attacks Success however can be limited 29

Thank you! Your questions and comments are welcomed 30