_vti_fpxploitation mshannon@fpxploiter.org



Similar documents
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Migrating helpdesk to a new server

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Activity 1: Scanning with Windows Defender

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

THE OPEN UNIVERSITY OF TANZANIA

FileMaker Server 13. FileMaker Server Help

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

Nessus scanning on Windows Domain

NetSupport DNA Configuration of Microsoft SQL Server Express

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Creating and Configuring Web Sites in Windows Server 2003

PaperStream Connect. Setup Guide. Version Copyright Fujitsu

NetSupport DNA Configuration of Microsoft SQL Server Express

Mobility Services Platform Software Installation Guide

Five Steps to Improve Internal Network Security. Chattanooga ISSA

A Roadmap for Securing IIS 5.0

Release Notes for Websense Security v7.2

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Advanced Event Viewer Manual

Setting Up Scan to SMB on TaskALFA series MFP s.

ITA Mail Archive Setup Guide

ScanRouter Lite

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

PC Monitor Enterprise Server. Setup Guide

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.

MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER

Lab Configuring Access Policies and DMZ Settings

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Web Security School Final Exam

Managing Qualys Scanners

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Kaseya Server Instal ation User Guide June 6, 2008

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

ecopy ShareScan v4.3 Pre-Installation Checklist

PC-Duo Web Console Installation Guide

File Share Navigator Online 1

This document details the following four steps in setting up a Web Server (aka Internet Information Services -IIS) on Windows XP:

AVG 8.5 Anti-Virus Network Edition

Penetration Testing Report Client: Business Solutions June 15 th 2015

MOODLE Installation on Windows Platform

Quick Start Guide for Parallels Virtuozzo

Citrix Access Gateway Plug-in for Windows User Guide

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Security Correlation Server Quick Installation Guide

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Manual Password Depot Server 8

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Web Application Vulnerability Testing with Nessus

FileMaker Server 9. Custom Web Publishing with PHP

Polar Help Desk Installation Guide

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

FREQUENTLY ASKED QUESTIONS

HOW TO DEPLOY AN EJB APLICATION IN WEBLOGIC SERVER 11GR1

Chapter 4 Managing Your Network

Lab Conducting a Network Capture with Wireshark

Document Exchange Server 2.5

Burst Technology bt-loganalyzer SE

A Decision Maker s Guide to Securing an IT Infrastructure

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.

Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server

Configuring Security for FTP Traffic

Bitrix Site Manager ASP.NET. Installation Guide

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

Yale Software Library

FileMaker Server 12. Custom Web Publishing with PHP

Manual. Netumo NETUMO HELP MANUAL Copyright Netumo 2014 All Rights Reserved

FileMaker Server 14. FileMaker Server Help

STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes

Owner of the content within this article is Written by Marc Grote

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

Discovery Guide. Secret Server. Table of Contents

E-Commerce for IT Advanced. Louis Aguila & Matt Burt

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Network Scanner Tool R3.1. User s Guide Version

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

Sage SalesLogix. Implementation Guide. Version 8.0 Developed by Sage SalesLogix User Assistance

Installing and Configuring Nessus by Nitesh Dhanjani

KM-1820 FS-1118MFP. Network Scanner Setup Guide

Security Guidelines for MapInfo Discovery 1.1

Parallels Plesk Panel 11 for your Linux server

GFI LANguard Network Security Scanner 3.3. Manual. By GFI Software Ltd.

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

Why Should You Care About Security Issues? SySmox WEB security Top seven ColdFusion Security Issues

Transcription:

_vti_fpxploitation mshannon@fpxploiter.org

Frontpage: Laying the ground work

What is it? Microsoft's integrated Web Site development tool. System for adding basic to advanced functionality with little or no web page experience. Integrated MS Office package Security Nightmare

Who is Vermeer Technologies? In early 1995, Vermeer Technologies developed one of the first web publishing tools for simple end users, Frontpage. Following enormous success, the application was later bought out by Microsoft and integrated in the Office package.

Frontpage: Decoding the system

Protocol Analysis

Client/Server Protocol Analysis Communication between Client and Server. Frontpage Client and Server extensions communicate over HTTP PUT requests. The Frontpage client makes requests against Author.dll, Admin.dll, and shtml.exe. Author.dll(exe) Authoring commands, uploading, downloading content, reviewing properties, adding enhancements. Admin.dll(exe) Admin commands, including adding additional users, modify user permissions, listing accounts. Shtml.exe, vti_rpc Initial access and service negotiation.

The Authentication System This authentication process takes place each time a request is performed, i.e login, upload, download, change permissions, navigate folders, etc. While an ineffective use of resources, it does limit attacks based on state.

_vti_inf.html _vti_inf.html This file provides configuration information and helps us determine something about the server.

_vti_inf.html Cont. Using the following simple guidelines when reading the _vti_inf.html file we can better determine the operating system. _vti_inf.html files with references to.exe tools most likely reside on Unix servers. _vti_inf.html files with references to.dll tools most likely reside on Windows Servers Server extension version numbers can further help us narrow down the options.

_vti_inf Version Table Using the information in _vti_inf.html, we can often correctly determine the OS version. Operating System/Version Windows 98/ME Personal Webserver? Windows NT 4.0 4.x Windows 2000 5.x Windows XP 5.x Frontpage Extension Version

Understanding Vermeer RPC Packets All responses from Frontpage Server Extensions come in the form of Vermeer RPC Packets. Vermeer Information Packets is coded within closely resemble HTML pages. these packets based on position within HTML tags. An early precursor to XML?

Sample Vermeer RPC Packet The following sample VTI Packet contains large amounts of information, including physical drive locations. Physical drive paths may be useful for Unicode exploits.

Debugging Server Extensions Using Windbg (Microsoft Debugger) we can explore Frontpage Server Extensions.

How to obtain and configure Windbg Download Windbg from Microsoft Debugging Website. http://www.microsoft.com/whdc/ddk/debugging/default.mspx Configure Symbols Server Symbols are required to determine the functions being called. http://www.microsoft.com/whdc/ddk/debugging/s ymbols.mspx

Frontpage Server Extension Dlls Based on past debugging exercises, the following is a partial list of dlls used by Frontpage Server Extensions. fp4autl.dll ffp4awel.dll fp4amsft.dll fp4avss.dll Author.dll Admin.dll

Basic tips for getting started in debugging Multiple guides and tutorials available for debugging. Windbg specific help files Google Simple commands to remember bm Set Breakpoints bc (ex, bm fp4awel!*) Clear Breakpoints g Go p

Interesting Discoveries Fp4Awel!Vservice Forms a listing of all documents on the defined web prior to accepting a request. References listing when replying to a request. Fp4Awel!DSPContext:getFile, get Document Called when downloading a file via Frontpage, perhaps there are options for Buffer overruns? NTDLL Called during authentication, do some of the prior attack vectors still apply?

Frontpage: Knocking on the door

Custom Tools

fpxploiter -> Frontpage Vulnerability Scanner Perl-Gtk Scanning tool

Summary Now that we have a better understanding of how Frontpage works, let's see about finding vulnerable targets. This is what brought about fpxploiter. It's a Perl-Gtk application the provides capability for: Locating Frontpage accessible webservers, using default options, or user defined accounts and passwords. Servers without passwords Servers with weak passwords

Using fpxploiter: How to Start Start fpxploiter with the command fpxploiter. Application opens with main window.

Using fpxploiter: How the scanner works? Start by providing a target list, the current configuration of the tool does not allow scanning of more than one Class C at a time. Select File->Set Targets or press Ctrl-T. Enter the host targets.

Using fpxploiter: How modify the password list? Select File->Set Password List and select you new password list file.

Using fpxploiter: How modify the default user account? Select File->Set User account and enter your new user account.

Using fpxploiter: How to export the results? Select File->Save Log and select the destination for your log file, use this AFTER the scanning is complete.

Additional Screen Captures Fpxploiter during a scanning session.

Future Directions Support for Apache Frontpage extensions. Redesign of the fpxploiter tool to provide generic Frontpage access library. Rebuild in C/Gtk or C++/QT. Support for uploading content.

Code All Code for fpxploiter is available the the following website. http://www.fpxploiter.org Additionally it's on the DEFCON CD.

rontpage: What to do when your there

ASP for Hackers

SQL Server Database Hunting SQL Server Database Access Tools Custom ASP pages that allow us to execute queries and explore SQL Servers. Using fpxploiter to locate vulnerable servers. Tie it all together with ASP pages to execute sql queries against the database.

Summary Fpxploiter helps us find vulnerable web servers. SQLUltimate.asp contains custom asp code that functions as a SQL Analyzer. Ideas? Add SQL Server users (if your in the System Admin role) Access corporate data Execute extended stored procedures Locate application accounts and passwords

Screen Capture The following screen capture shows the SQLUltimate.asp and a resulting query result. Image taken from http://aspalliance.com/mbrink1111/ Copyright 2003 Michael Brinkley, All Rights Reserved Used with Permission

Code All Code for SQLUltimate.asp is available the the following website. ASPAlliance.com http://aspalliance.com/mbrink1111/sqlanalyzer.asp

Command Line ASP ASP Page built to execute console commands and return the results. Built by Maceo <maceo @ dogmile.com> Allows execution of simple commands, good examples include netstat -a ipconfig -all Ver set net users Net localgroup

Summary Fpxploiter helps us find vulnerable web servers. cmdasp.asp contains custom asp code to execute simple console commands. Ideas? Use netstat -an & netstat -a as make shift reverse DNS. Use net localgroup and net view to understand drive mappings and groups. Use ping to find additional servers

Screen Capture The following screen capture shows cmdasp.asp in action.

Code All Code for cmdasp.asp is available the the following website. http://www.securiteam.com/tools/5ap020u35c.h tml

Future Ideas ASP Code can be used in conjunction with the winsock control to provide scanning from the webserver. ASP Code can be used to view SMB Shares and Remote Administration (See http://cifs.novotny.org/, amazing work with ASP.NET) ASP Code can be used with xmlhttp controls to navigate internal web sites (Intranets)

Frontpage: Holding down the fort

Securing Frontpage through best practices

Strong Passwords As in most systems, your last line of defense is your password, and Frontpage is no different. Choose strong passwords, consisting of upper and lowercase characters (with LANMAN this is rather meaningless), numbers, and special characters. Stick with passwords over eight characters in length.

Changed Admin Account As is good practice, consider changing the name of your Administrator account. Choose something meaningful, however avoid the typical choices, such as: Root Admin 123 Password

Concept of least privilege Only provide the access necessary to get the job done. Use the Frontpage roles to assign users Author rights to specific webs as appropriate. Reserve Admin rights for specific accounts.

IP Restrictions Using IIS native IP based restrictions you can effectively block a large portion of Frontpage attacks. Use the IIS Access tab to block access to the admin.dll and author.dll to IP addresses outside of your internal range. Additionally, consider segmenting your developers and giving this group access only.

Frontpage: Closing words

Fpxploiter.org Site Clearing house for code and commentary.

References and Links References to the many sources used in this research, and a thanks to all involved. Older Frontpage Hacking Texts http://www.insecure.org/sploits/microsoft.frontpage.ins ecurities.html Perl-Gtk Tutorial http://personal.riverusers.com/~swilhelm/gtkperltutorial/ Microsoft Frontpage MSDN http://msdn.microsoft.com/library/default.asp?url=/libra ry/en-us/dnservext/html/fpse02win.asp

Thanks and Credits This project would never have been made possible without the support of the following people. Mary Shannon <Wife and Greatest Fan> Matthew Decker <Mentor> mjdecker@kpmg.com Michael D'Andrea <Graphics Designer> centralsource@hotmail.com Stephen Bickle <Technical Review> steve@xsec.net Stephen Wilhelm <Perl-Gtk Tutorial>

Questions or Comments?