The Power of FOCA 3
What s a FOCA? 5/25/12 2
Al principio fue el Metadato 5/25/12 3
Metadata, hidden info Mala ges.ón Mala conversión Opciones inseguras & lost data Buscadores Arañas Bases de datos Mala ges.ón Formatos embebidos Conversión errónea Opciones Inseguras Ficheros embebidos Nuevas aplicaciones o nuevas versiones Ficheros embebidos 5/25/12 4
Printers 5/25/12 5
Malware Dirigido 5/25/12 6
Targeting Malware 5/25/12 7
Electing the entry point 5/25/12 8
Social Engineering Attack 5/25/12 9
Anonym0us case 5/25/12 10
Lost Data 5/25/12 11
Metadata Risks Relaciones Ocultas Historia de Acciones Entre empresas Entre personas Piratería de Software Información táctica Ataques 5/25/12 12
Drug Dealer 5/25/12 13
Forensic FOCA hjp://www.elladodelmal.com/ 2012/02/forensic- foca- beta- 5/25/12 14
Show Me Your Metadata 5/25/12 15
Internal Fingerprinting with FOCA 5/25/12 16
Phase 1: Metadata
FOCA 2 5/25/12 18
FOCA 2.5: Exalead 5/25/12 19
Network Discovery 5/25/12 20
Búsqueda de URLS en buscadores 5/25/12 21
Bing IP 5/25/12 22
Shodan 5/25/12 23
Network Discovery: Well Known Records Zone Transfer DNS SOA, MX, SPF, DKIM, LDAP, VoIP, Active Directory. AXFR Diccionary Search Server1, Intranet, Private, DNS, etc. 5/25/12 24
PTR Scannig 5/25/12 25
Huge domains case 5/25/12 26
Network Discovery Algorithm http://apple1.sub.domain.com/~chema/dir/fil.doc 1) http -> Web server 2) GET Banner HTTP 3) domain.com is a domain 4) Search NS, MX, SPF records for domain.com 5) sub.domain.com is a subdomain 6) Search NS, MX, SPF records for sub.domain.com 7) Try all the non verified servers on all new domains 1) server01.domain.com 2) server01.sub.domain.com 8) Apple1.sub.domain.com is a hostname 9) Try DNS Prediction (apple1) on all domains 10) Try Google Sets(apple1) on all domains 5/25/12 27
Network Discovery Algorithm http://apple1.sub.domain.com/~chema/dir/fil.doc 11) Resolve IP Address 12) Get Certificate in https://ip 13) Search for domain names in it 14) Get HTTP Banner of http://ip 15) Use Bing Ip:IP to find all domains sharing it 16) Repeat for every new domain 17) Connect to the internal NS (1 or all) 18) Perform a PTR Scan searching for internal servers 19) For every new IP discovered try Bing IP recursively 20) ~chema -> chema is probably a user 5/25/12 28
Network Discovery Algorithm http://apple1.sub.domain.com/~chema/dir/fil.doc 21) /, /~chema/ and /~chema/dir/ are paths 22) Try directory listing in all the paths 23) Search for PUT, DELETE, TRACE methods in every path 24) Fingerprint software from 404 error messages 25) Fingerprint software from application error messages 26) Try common names on all domains (dictionary) 27) Try Zone Transfer on all NS 28) Search for any URL indexed by web engines related to the hostname 29) Download the file 30) Extract the metadata, hidden info and lost data 31) Sort all this information and present it nicely 32) For every new IP/URL start over again 5/25/12 29
Click & Go 5/25/12 30
Phase 2: Network
How Foca found a data 5/25/12 32
Role Oriented View 5/25/12 33
Fingerprinting 404 Not Found Options messages Domain names and software Aspx Error Messages HTTP Banner Hostname IP Addres SMTP Banner Digital Certificates Shodan 5/25/12 34
DNS Version.bind 5/25/12 35
Primary Master 5/25/12 36
Vulnerabilites View 5/25/12 37
Phase 3: Vulnerabilities
Customizable Search 5/25/12 39
FOCA + Spidering 5/25/12 40
FOCA + Spidering 5/25/12 41
Digital Certificates 5/25/12 42
FOCA 2.5 URL Analysis 5/25/12 43
.listing 5/25/12 44
Unsecure Http Methods 5/25/12 45
Search & Upload 5/25/12 46
Proxy 5/25/12 47
Fuzzing options 5/25/12 48
DNS Cache Snooping 5/25/12 49
DNS Cache Snooping 5/25/12 50
DNS Cache Snooping Internal Software Windows Update Gtalk Evilgrade Detecting vulnerable software to Evilgrade attacks AV evassion Detecting internal AV systems Malware driven by URL Hacking a web site ussually visited by internal users 5/25/12 51
DNS Cache detection 5/25/12 52
Log filter 5/25/12 53
FOCA Reporting Module 5/25/12 54
FOCA Reporting Module 5/25/12 55
Fear The FOCA 5/25/12 56
FOCA Online 5/25/12 57
Cleaning documents OOMetaExtractor hjp://www.codeplex.org/oometaextractor 5/25/12 58
IIS MetaShield Protector hjp://www.metashieldprotector.com 5/25/12 59
FOCA on Linux? 5/25/12 60
Buy a FOCA T-Shirt 5/25/12 And be «Sexy» }:)) 61
Questions? 5/25/12 62