Vulnerability scanning

Similar documents
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Collecting information

Penetration Testing with Kali Linux

Introduction to Nessus by Harry Anderson last updated October 28, 2003

Client logo placeholder XXX REPORT. Page 1 of 37

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Tenable Tools for Security Compliance The Antivirus Challenge

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Penetration Testing Report Client: Business Solutions June 15 th 2015

Vulnerability Assessment and Penetration Testing

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Connectivity to Polycom RealPresence Platform Source Data

Installing and Configuring Nessus by Nitesh Dhanjani

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Penetration Testing - a way for improving our cyber security

Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.

Vulnerability analysis

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Running a Default Vulnerability Scan

CYBERTRON NETWORK SOLUTIONS

Ethical Hacking Course Layout

Attack Frameworks and Tools

Blended Security Assessments

WHITEPAPER. Nessus Exploit Integration

1 Scope of Assessment

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Running a Default Vulnerability Scan SAINTcorporation.com

IDS and Penetration Testing Lab ISA656 (Attacker)

Using Nessus In Web Application Vulnerability Assessments

Security Considerations White Paper for Cisco Smart Storage 1

Rainbow Cracking: Do you need to fear the Rainbow? Philippe Oechslin, Objectif Sécurité. OS Objectif Sécurité SA, Gland,

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Web Application Vulnerability Testing with Nessus

An Introduction to Network Vulnerability Testing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SCP - Strategic Infrastructure Security

IBM. Vulnerability scanning and best practices

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

June 2014 WMLUG Meeting Kali Linux

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young


Build Your Own Security Lab

Vulnerability Scan. January 6, 2015

Learning security through insecurity

Demystifying Penetration Testing

Newsletter - September T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER

AN OVERVIEW OF VULNERABILITY SCANNERS

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Penetration Testing. What Is a Penetration Testing?

Attack and Penetration Testing 101

Metasploit Unleashed. Class 2: Information Gathering and Vulnerability Scanning. Georgia Weidman Director of Cyberwarface, Reverse Space

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Introduction to Network Security Lab 2 - NMap

1.0 Introduction. 2.0 Data Gathering

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

A Decision Maker s Guide to Securing an IT Infrastructure

Learn Ethical Hacking, Become a Pentester

Windows Operating Systems. Basic Security

Penetration Testing LAB Setup Guide

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

FREQUENTLY ASKED QUESTIONS

Internal Penetration Test

SNMP Manager User s Manual

How To Fix A Snare Server On A Linux Server On An Ubuntu (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

CRYPTUS DIPLOMA IN IT SECURITY

The Trivial Cisco IP Phones Compromise

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

How To Test A Control System With A Network Security Tool Like Nesus

GFI LANguard Network Security Scanner 3.3. Manual. By GFI Software Ltd.

SNMP Manager User s Manual

SEAGATE BUSINESS NAS ACCESSING THE SHELL. February 1, 2014 by Jeroen Diel IT Nerdbox

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Automated Penetration Test

A Vulnerability Assessment Tool based on OVAL in Linux System

Nessus Agents. October 2015

IBM Security QRadar Vulnerability Manager Version User Guide

A Guide to New Features in Propalms OneGate 4.0

IBM Managed Security Services Vulnerability Scanning:

Network Security Exercise #8

Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN

IT HEALTHCHECK TOP TIPS WHITEPAPER

Transcription:

Mag. iur. Dr. techn. Michael Sonntag Vulnerability scanning Security and Privacy VSE Prag, 7-11.6.2010 E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology (FIM) Johannes Kepler University Linz, Austria Michael Sonntag 2010

Source files shadow1, shadow2, shadow3» Linux password files passwords.txt» A file with passwords extracted from Windows Source data Requirements: Administrative rights» For installing software Installed software (see CD) Software: Nmap (Nessus) Must be downloaded and activated! John the Ripper Ophcrack Michael Sonntag Security and Privacy: Vulnerability scanning 2

Please note! We are not going to attack anyone here! We are trying to indentify problems for later fixing it Permission is always required for vulnerability scanning Which system(s) At what time What kinds of scans (destructive, ) We will scan our own system here ONLY! Michael Sonntag Security and Privacy: Vulnerability scanning 3

NMap NMap (Network MAPper) is a network scanner It tries to find all computers in a specific network and checks, what ports are open, what OS they are running, whether there is a firewall, etc. It does not look for specific vulnerabilities! But it gives recommendations; e.g. services to disable Some scans + vuln. systems Lock-up/crash! Used as a tool for inventory generation in a network Are there any computers which should not be there? Can also be used to gather information for a later attack» Which OS/software and which version is running Stages: 1 =Host discovery, 2 =Port scan, 3 =Service/version detection, 4 =OS detection, 5 =Scripting Scripting may also include vulnerability/malware detection! Michael Sonntag Security and Privacy: Vulnerability scanning 5

NMap Usage: Start program and enter IP address Select profile for scanning» Special options only available in the command line version or when constructing a new profile! Your tasks: Install NMap Scan the local subnet for hosts» Use a "Regular scan" Scan the machine of your neighbour» Use a "Operating System detection scan" Interpret the results» Correct output?» Something surprising/dangerous found? Michael Sonntag Security and Privacy: Vulnerability scanning 6

John the Ripper Password cracking tool Uses word lists as well as brute-force» Word lists can be "multiplied" by mangling rules (reverse, ) Note: Long lists take longer, but provide better chances!» Brute force: Define character set and set password length limit Can also be used as password-strength checking module "Reconstructs" the password from its hash» Therefore requires access to the password file! Can be interrupted and restarted (may take a long time!) Supported are the following password hash types crypt(3) hash types: traditional & double-length DES-based, BSDI extended DES-based, FreeBSD MD5-based (also used on Linux, Cisco IOS), OpenBSD Blowfish-based (also used on some Linux distr.), Kerberos/AFS, Windows NT/2000/XP LM DES-based» More with additional patches! Michael Sonntag Security and Privacy: Vulnerability scanning 11

John the Ripper Your tasks: Run John the Ripper against the provided shadow files» "Scenarios/shadow1": Try wordlist» "Scenarios/shadow2": Try wordlist Try incremental (=brute force) search, profile "alpha"» "Scenarios/shadow3": Try in your spare time! Interpret the results/success probabilities Michael Sonntag Security and Privacy: Vulnerability scanning 12

Ophcrack Password cracking tool for Windows LAN Manager/NT LAN Manager hashes (i.e. Win passwords)» LM / NTLM hashes (not stored in cleartext, but as hash only)» Windows Vista has the (easier) LM hashes disabled by default Older versions still store the weak LM for backwards compatibility Can import the hashes from various formats or read it directly Based on Rainbow tables and brute force Some are freely available, others cost money» You could theoretically create them yourself, but this is an extremely time and resource-intensive action! Free tables: About 99.9 % coverage for alphanumeric passwords of up to 14 characters (LM), 99% for NTLM» All printable chars/symbols/space (NT/Vista); German á US$ 99 Michael Sonntag Security and Privacy: Vulnerability scanning 14

Reducing time be investing memory "Pre-computed passwords" Rainbow tables Simplest form: Generate all passwords + their hashes and store them for later lookup (immediate cracking!) Drawback: Gigantic table! Rainbow tables: Compute all passwords, but store only a small part of them After finding the hash, some time is required to obtain the actual password Time is reduced by the square of the available memory Countermeasure: Use "salting" A random value is generated, prepended to the password, and stored Rainbow table would have to be enlarged for the salt» 4 char salt + 14 char password 18 char rainbow table! Philippe Oechslin: Ophcrack Michael Sonntag Security and Privacy: Vulnerability scanning 15 http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/

Ophcrack Your tasks: Run Ophcrack against the provided passwords Discuss the results:» Why are some found quickly, but the same password takes much longer in another instance?» Why is this working in Windows, but not for other systems? Michael Sonntag Security and Privacy: Vulnerability scanning 16

Nessus Nessus is a scanner for vulnerabilities Based on signatures Finds only known problems!» Currently about 35000 plugins Updating the signatures: Possible First step: Identify OS Almost all vuln. depend on this Registry, SNMP, ICMP, MSRPC, NTP Second step: Check which vuln. might apply and test them Not by actually exploiting them, only whether it would work! From where to run the scan? Outside: Probably already safe, best to be sure Inside (Critical machines): Defence in depth DMZ: One computer was hacked Others still secure? Commercial use/additional functionality You have to pay! US$ 1200 per scanner per year Michael Sonntag Security and Privacy: Vulnerability scanning 19

Nessus Nessus is separated into a daemon and a client Scanning is done by the daemon(s); the client is just an UI Can do more intensive scanning if provided credentials for logging on to a computer Vulnerabilities are scripted in NASL Nessus Attack Scripting Language (see next page)» You can write your own too! Detection is not perfect: False positives my occur Attention: Some scans can crash the target! Take care before enabling "all" scans! Option "Safe checks" disables anything dangerous and checks through banners only; no actual trying Found a vulnerability? Fix it! Prioritize the problems detected Bugtraq ID or CVE number for obtaining further information Michael Sonntag Security and Privacy: Vulnerability scanning 20

Nessus: NASL example (phpcms_xss.nasl) if(description) { script_id(15850); script_version("$revision: 1.5 $"); script_cve_id("cve-2004-1202"); script_bugtraq_id(11765); script_name(english:"phpcms XSS"); desc["english"] = " The remote host runs phpcms, a content management system written in PHP. This version is vulnerable to cross-site scripting due to a lack of sanitization of user-supplied data in parser.php script. Successful exploitation of this issue may allow an attacker to execute malicious script code on a vulnerable server. Solution: Upgrade to version 1.2.1pl1 or newer Risk factor : Medium"; include("http_func.inc"); include("http_keepalive.inc"); port = get_http_port(default:80); if (! get_port_state(port))exit(0); if (! can_host_php(port:port) ) exit(0); if ( get_kb_item("www/" + port + "/generic_xss") ) exit(0); buf = http_get(item:"/parser/parser.php?file=<script>foo</script>", port:port); r = http_keepalive_send_recv(port:port, data:buf, bodyonly:1); if( r == NULL )exit(0); if(egrep(pattern:"<script>foo</script>", string:r)) { security_warning(port); exit(0); } script_description(english:desc["english"]); script_summary(english:"checks phpcms XSS"); script_category(act_gather_info); script_copyright(english:"this script is Copyright (C) 2004 David Maciejak"); script_family(english:"cgi abuses : XSS"); script_require_ports("services/www", 80); script_dependencie("http_version.nasl", "cross_site_scripting.nasl"); exit(0); } Michael Sonntag Security and Privacy: Vulnerability scanning 21

Nessus Usage: Start program and add IP address Select scan policy for scanning» Use the "Default scan policy" You can construct your own as well, e.g. only specific tests Hint: Disable Windows Firewall on both source and target! Your tasks: Install Nessus» Register for a home-user activation code» Download the plugins» Reboot or manually start the Nessus service ("Tenable Nessus") Scan the machine of the instructor Interpret the results» Any weaknesses found?» Are they serious? Michael Sonntag Security and Privacy: Vulnerability scanning 22

Conclusions Many tools for administrators to improve security can also be used by attackers And they will be Note: Most security tools leave clear traces in log files» But many can also be used/configured to be quite stealthy! Therefore they should be used to test your own systems Regularly, if possible, and with updated signatures Set minimum requirements for passwords Or they can be cracked rather easily!» One reason for the shadow passwords file /etc/passwords is (and needs to be) world readable Especially important on Windows» Also disable the weak LM hashes Do it yourself, before they do it to you! Michael Sonntag Security and Privacy: Vulnerability scanning 27

??? Questions? Thank you for your attention!??? Michael Sonntag 2010