Hacking for Fun and Profit



Similar documents
(WAPT) Web Application Penetration Testing

Hacking-Lab Remote Security Lab 15. April 2010

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Smart Card APDU Analysis

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Cyber Security Workshop Ethical Web Hacking

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Web Application Penetration Testing

Web application testing

Application Security Testing

Common Security Vulnerabilities in Online Payment Systems

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Cross Site Scripting in Joomla Acajoom Component

Ethical Hacking Penetrating Web 2.0 Security

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION


APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Hack Proof Your Webapps

Offensive Security. Advanced Web Attacks and Exploitation. Mati Aharoni Devon Kearns. v. 1.0

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

HackMiami Web Application Scanner 2013 PwnOff

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Application Security Testing. Generic Test Strategy

Penetration Testing with Kali Linux

Web Application Report

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Ethical Hacking as a Professional Penetration Testing Technique

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Web Security Testing Cookbook*

Testnet Summerschool. Web Application Security Testing. Dave van Stein

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

FORBIDDEN - Ethical Hacking Workshop Duration

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Course Content: Session 1. Ethics & Hacking

CYBERTRON NETWORK SOLUTIONS

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Honeypot that can bite: Reverse penetration

Gateway Apps - Security Summary SECURITY SUMMARY

Using Free Tools To Test Web Application Security

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Secure Web Development Teaching Modules 1. Threat Assessment

A Network Administrator s Guide to Web App Security

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Web Maniac Hacking Trust. Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security

Check list for web developers

Detailed Description about course module wise:

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Guidelines for Web applications protection with dedicated Web Application Firewall

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Essential IT Security Testing

Chapter 1 Web Application (In)security 1

Social Engineering Toolkit

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Web Application Security: Exercise Development Approaches

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Ethical Hacking & Cyber Security Workshop

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Web Application Security

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Enterprise Application Security Workshop Series

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Web application security

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Executive Summary On IronWASP

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

Bust a cap in a web app with OWASP ZAP

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Data Breaches and Web Servers: The Giant Sucking Sound

SYWorks Vulnerable Web Applications Compilation For Penetration Testing Installation Guide

Web attacks and security: SQL injection and cross-site scripting (XSS)

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Web Application Security

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Loophole+ with Ethical Hacking and Penetration Testing

Testing the OWASP Top 10 Security Issues

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web-Application Security

SiteLock. Internet Security: Big Threats for Small Business. Presented by: Neill Feather, President

The Security Development Life Cycle

The Top Web Application Attacks: Are you vulnerable?

Overview of the Penetration Test Implementation and Service. Peter Kanters

Security Evaluation CLX.Sentinel

Course Title: Course Description: Course Key Objective: Fee & Duration:

Web Application Security Considerations

CRYPTUS DIPLOMA IN IT SECURITY

Penetration Testing in Romania

Transcription:

Hacking for Fun and Profit W3Lc0me to Th3 Fu1ur How to break stuff How to trade How to hide Help! Page 1

Knowing the enemy Page 2

E1 - Who am I ^ Ivan Bütler, Uznach, 31.12.1970 ^ Speaker at Blackhat 2008 Las Vegas ^ Lecturing at University of Applied Science Rapperswil ^ Lecturing at University of Appliec Science Lucerne ^ Founder of Compass Security AG ^ Founder of Swiss Cyber Storm II / Wargames / Hacking-Lab ^ Passionate Swiss Security Researcher ^ Husband of Cornelia and father of Tim and Nick (7 & 9) Page 3

Compass Security Swiss Pentesters Page 4

Welcome @ BYOL - IT Underground This BOYL Topics Web Security Bypass Authorization Session Fixation Cross Site Scripting SQL Injection Xpath Injection XSRF JSON Hijacking Click Jacking Observation Plugin XML Attack Applet Hacking Java Script Malware Analysis Oracle Wargame URL Redirection Attack Page 5

Hacking-Lab Remote Security Lab Swiss Cyber Storm II Computer Wargames / BYOL Page 6

Hacking for Fun and Profit How does it work? Register a Hacking-Lab Account Choose your favorite Wargame Exploit the vulnerability Get Points from the Jury Improve your Ranking Page 7

Hacking-Lab Infrastructure Page 8

Wargame Testing Webapplications Page 9

Wargame Testing Webapplication The education applications are developed by Compass Security The applications are vulnerable Please don t perform a Denial of Service Attack (this is easy) Please don t drop databases (this is easy too) Important URLs glocken.hacking-lab.com www.hacking-lab.com (vulnerable app) (lab cases) Login Accounts for the Wargames UsersID s: hacker10...hacker40 Passwords: compass Page 10

Registered -> Choose your Wargame Page 11

Who is being exploited? I will play the victim! Talk to me once you are ready I will click on every link you want swisscyberstorm@gmail.com Page 12

Global Ranking Page Get Points Page 13

How to prepare for the Wargames? Bring your own laptop Use web inspection proxies Use your brain Have your landing page available Your personal web server on your laptop Your personal tomcat server on your laptop Tools that are recommended for the Wargames Wireshark, Paros, Burp, WebScarab, LiveHttpHeader, Add N Cookie Editor, Tamper Data, Editor, Local web server, netcat, jad, malzilla, Page 14

What is a landing page? Landing Page Vulnerable App glocken.hacking-lab.com Example JSON Hijacking Landing Page: your own web server JSON Object ( confidential data) Page 15

BYOL IT Underground - Warsaw Compass Security AG, Switzerland Ethical Hacking & Penetration Testing Sign-Up a Hacking-Lab Account Choose your Lab Solve your Lab Get Points Ask if required Page 16

What are the Wargames about? Short Introduction Page 17

Introduction Wargames Available Wargames Bypass Authorization Session Fixation Cross Site Scripting SQL Injection Xpath Injection XSRF JSON Hijacking Click Jacking Observation Plugin XML Attack Applet Hacking Java Script Malware Analysis Oracle Wargame URL Redirection Attack Page 18

Bypassing Authorization Authenticate with hacke10, hacker11, hacker12... hacker40 with the password compass Every user has a credit-card number Find a way to get other users profile information by manipulating the request where the profile is shown Test your own profile first, then get other profiles Page 19

Session Fixation Authenticate with hacke10, hacker11, hacker12... hacker40 with the password compass Use the application URL from the lab description! (important) Perform a session fixation attack. You have solved this exercise if you are authenticated to the web app, without entering the password the victim entered the password for you Hacking-Lab plays the role of the victim! Page 20

Cross Site Scripting Authenticate with hacke10, hacker11, hacker12... hacker40 with the password compass Use the application URL from the lab description! (important) Perform a XSS Attack You have solved this exercise if you have stolen the victim s session information Hacking-Lab plays the role of the victim! Page 21

SQL Injection (Simple) Don t authenticate with a password authenticate with an sql injection attack Use the application URL from the lab description! (important) Perform a SQLi You have solved this exercise if you can login to any account without knowing the password Page 22

SQL Injection (Advanced) Find the second SQL injection vulnerability (not the login page from the case before) Use the application URL from the lab description! (important) Perform a SQLi attack You have solved this exercise if you can extract name, surname, creditcard with one single sql injection exploit Page 23

Xpath Injection Find the Xpath injection vulnerability (transaction id) Use the application URL from the lab description! (important) Perform a Xpath injection attack You have solved this exercise if you can extract others than your own transaction within the shop (other transactions disclose other users credit card information) Page 24

JSON Hijacking The vulnerable cow-bell shop has a JSON interface. The interface returns profile information of the authenticated user Use the application URL from the lab description! (important) Perform a JSON hijacking attack You have solved this exercise if you can store the victim s profile information to your landing page Hacking-Lab plays the role of the victim (required) Page 25

Click Jacking Create a click jacking web app that hides cow-bell shopping Use the application URL from the lab description! (important) Perform a Click Jacking attack Hacking-Lab plays the role of the victim (required) Page 26

Observation Plugin Develop a Firefox Plugin based on LiveHttpHeader that observes the users sessions and stores them to your landing page Use the application URL from the lab description! (important) Compile the observation plugin for firefox Hacking-Lab plays the role of the victim (required) Page 27

XML Attack Exploit the XML search functionality in the cow-bell show Extract /etc/passwd and /etc/shadow from the cow-bell server and crack them Use the application URL from the lab description! (important) You have solved this wargame once you have cracked the accounts Page 28

Applet Hacking Applets use serialized objects in between the browser and the application. They can t be analyzed with an inspection proxy But the server does not check the price when ordering cow-bells Use the application URL from the lab description! (important) You have solved this wargame if you can buy cow-bells with any price you want (1 EURO per bell) Page 29

Java Script Malware Analysis Hacker s are injecting obfuscated java scripts into vulnerable web apps Use the application URL from the lab description! (important) De-Obfuscate the java script. Show the result to Hacking-Lab Explain the malware get Points Page 30

Oracle Wargame Advanced SQL Injection Wargame provided by Alexander Kornbrust Red Database Security Use the application URL from the lab description! (important) Exploit the application with advanced sql injection techniques Get points Page 31

URL Redirection Attack Find the url redirection vulnerability in the cow-bell shop Exploit the redirection and fool the Hacking-Lab victim Use the application URL from the lab description! (important) You have solved this wargame if you can hijack the victim s identity Hacking-Lab play s the role of the victim Page 32

Thank you for Reading Compass Security AG, Switzerland Ethical Hacking & Penetration Testing E1 ivan.buetler@csnc.ch e1@hacking-lab.com Compass Security AG Swiss Ethical Hacking www.csnc.ch Page 33