Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin



Similar documents
Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

Vulnerability Assessment and Penetration Testing

Penetration Testing with Kali Linux

Penetration Testing Workshop

Vulnerability analysis

Lab 10: Security Testing Linux Server

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

AUTHOR CONTACT DETAILS

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

Learn Ethical Hacking, Become a Pentester

The Nexpose Expert System

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Metasploit Unleashed. Class 2: Information Gathering and Vulnerability Scanning. Georgia Weidman Director of Cyberwarface, Reverse Space

Penetration Testing. What Is a Penetration Testing?

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Penetration Testing Report Client: Business Solutions June 15 th 2015

Security of IPv6 and DNSSEC for penetration testers

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

IDS and Penetration Testing Lab ISA656 (Attacker)

1 Scope of Assessment

CIT 380: Securing Computer Systems

Using Nessus In Web Application Vulnerability Assessments

Anatomy of an ethical penetration test

How to hack a website with Metasploit

1. LAB SNIFFING LAB ID: 10

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

Information Security. Training

INFORMATION SECURITY TRAINING CATALOG (2015)

CYBERTRON NETWORK SOLUTIONS

SCP - Strategic Infrastructure Security

Penetration Testing SIP Services

CRYPTUS DIPLOMA IN IT SECURITY


COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Automation of Post-Exploitation

Metasploit Lab: Attacking Windows XP and Linux Targets

IDS and Penetration Testing Lab ISA 674

Attack Frameworks and Tools

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Penetration: from Application down to OS

Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.

Client logo placeholder XXX REPORT. Page 1 of 37

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Passive Vulnerability Detection

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Network Architecture & Active Directory Considerations for the PI System. Bryan Owen - OSIsoft Joel Langill - SCADAhacker

Audience. Pre-Requisites

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

A Selection of Network Penetration Test Tools

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

SECUREIT.CO.IL. Tutorial. NetCat. Security Through Hacking. NetCat Tutorial. Straight forward, no nonsense Security tool Tutorials

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Web Application Vulnerability Testing with Nessus

Host Discovery with nmap

NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy

Nmap: Scanning the Internet

Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities. By Ed Skoudis

Penetration Testing 2014

by Penetration Testing

WHITEPAPER. Nessus Exploit Integration

Project 2: Firewall Design (Phase I)

IDS and Penetration Testing Lab II

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Penetration Testing - a way for improving our cyber security

Vinny Hoxha Vinny Hoxha 12/08/2009

Automated penetration testing with Nmap s new scripting engine SCAN TIME

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Installing and Configuring Nessus by Nitesh Dhanjani

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Penetration Testing Walkthrough

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

IBM. Vulnerability scanning and best practices

Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.

Lab Objectives & Turn In

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Multifaceted Approach to Understanding the Botnet Phenomenon

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

How To Hack A Nmap Port Scan With A 10 Second Delay On A Network With A Network On A Windows Server (For A Freebie) On A Linux Computer (For Freebie). For A Free Download) On An Ipnet (For

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Transcription:

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10 Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 1

Scan Types Network sweeping: Send a series of probe packets to identify live hosts at IP addresses in the target network Network tracing: Determine network topology and draw a map Port scanning: Determine listening TCP and UDP ports on target systems OS fingerprinting: Determine target operating system type based on network behavior Version scanning: Determine the version of services and protocols spoken by open TCP and UDP ports Vulnerability scanning: Determine a list of potential vulnerabilities (misconfigurations, unpatched services, etc.) in the target environment Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 2

Nmap Port Scanning Nmap doesn t check all ports by default This is very important to note it s not a comprehensive scan by default By default, Nmap checks only the top 1,000 most used ports for TCP and/or UDP The nmap-services file indicates the ranking of the most common ports, based on widespread scanning research by Fyodor Nmap does not check all ports less than 1024 by default anymore The F option (which stands for Fast ) says to scan the top 100 ports The --top-ports [N] option tells Nmap to scan for the N most popular ports For a comprehensive or targeted scan, use the p option -p 0-65535 will scan all ports -p 22,23,25,80,445 will check only those ports The flag T: and U: can be included in the list to specify TCP or UDP Ports are scanned in random order, but r makes them not randomized Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 3

Version Scanning When Nmap identifies an open port, it displays the default service commonly associated with that port Based on nmap-services file, which lists about 2,200 services Additional services are searchable at the Internet Assigned Numbers Authority (IANA) port assignments at http://www.iana.org/assignments/port-numbers But, what services are on ports not in that list? And, what about an admin who configures a service to listen on an unexpected port? Example: Web server on TCP 90 or sshd on TCP 3322 And, what service and protocol version is the target listening service using? Nmap version scanning has the answer Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 4

Version Scanning Example [root@fedora13 nmap-5.21]#./nmap -n -sv -p 1-200 192.168.0.31 Starting Nmap 5.21 ( http://nmap.org ) at 2010-10-15 14:11 CDT Nmap scan report for 192.168.0.31 Host is up (0.0022s latency). Not shown: 197 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.5 (protocol 2.0) 80/tcp open http? Service detection performed. Please report any incorrect results at http://nmap.org/submit/. Nmap done: 1 IP address (1 host up) scanned in 86.11 seconds [root@fedora13 nmap-5.21]# Slide not part of SANS SEC560 5

Nmap Scripting Engine Goals of the Nmap Scripting Engine (NSE) Allow for arbitrary messages to be sent or received by Nmap to multiple targets, running scripts in parallel Be easily extendable with community-developed scripts Support extended network discovery (whois, DNS, etc.) Perform more sophisticated version detection Conduct vulnerability scanning Detect infected or backdoored systems Exploit discovered vulnerabilities May someday rival Nessus and NASL as a generalpurpose, free, open source vulnerability scanner Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 6

Nmap Scripting Engine Scripts Written in the Lua programming language Often used in games, Lua is fast, flexible, and free, with a small interpreter that works across platforms and is easily embedded inside of other applications Described in detail at www.lua.org To invoke NSE: To run all scripts in the category of 'default': # nmap sc [target] p [ports] To run an individual script: # nmap --script=[all,category,dir,script ] [target] p [ports] Add --script-trace for detailed output from each script Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 7

Nexpose Vulnerability Scanner Nexpose Community Edition No Roles, can only scan 32 IP's, support through community Nexpose Consultant Edition No Roles, can only scan 128 IP's, limited Support Nexpose Enterprise Edition Includes the full set of tools, unlimited IP's, Role definitions, LDAP/AD and Kerberos Authentication Slide not part of SANS SEC560 8

Nexpose Vulnerability Scanner Built in Set of Scan Templates In Community Edition the Scan Templates cannot be modified and you cannot add new Scan Templates Templates: PCI, HIPAA, Pen Testing, Audit, Discovery, SOX, Microsoft Hotfix, etc Built in identification of Vulnerabilities that are exploitable by Metasploit and known exploits found at www.exploit-db.com (with limits) Slide not part of SANS SEC560 9

Exploitation Slide not part of SANS SEC560 10

What is Exploitation? Exploit: Code or technique that a threat uses to take advantage of a vulnerability For a penetration tester exploitation often involves gaining access to a machine to run commands on it Possibly with limited privileges Perhaps with superuser privileges Some examples: Move files to a target machine Take files from a target machine Sniff packets at the target Reconfigure the target machine Install software on a target machine Especially Dangerous! Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 11

Categories of Exploits Exploit: a piece of code that makes a target machine do something on behalf of an attacker Generally speaking, most exploits fall into one of three categories: Service-side exploit Client-side exploit Local privilege escalation A penetration tester may need to use any one, or more likely, a combination of each of these kinds of attacks Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 12

Metasploit Exploitation Framework Metasploit is a free, open-source exploitation framework What s an exploitation framework? An environment for running numerous different exploits in a flexible fashion An environment for creating new exploits, using interchangeable piece parts Simplifies the creation of new exploits Standardizes the usage of new exploits Runs on Linux, Mac OS X, and Windows Although, according to documentation for some versions, The Metasploit Framework is only partially supported on the Windows platform. If you would like to access most of the Framework features from Windows, we recommend using a virtualization environment, such as VMware, with a supported Linux distribution Network Pen Testing & Ethical Hacking - 2010, All Rights Reserved 13

Metasploit Framework Components Directorys under /opt/msfe (or your installed location of metasploit) /msf3/ - Various framework ways of usage: msfconsole, msfgui, msfweb, msfcli Encoding tools: msfencode /etc/msf3/documentation/ - Documentation /etc/msf3/modules/ - exploits/ - exploits for various systems: unix/windows/etc payloads/ - a stage and stager to implement a function such as a reverse shell encoders/ - used to obuscate code /etc/msf3/plugins/ - provide additional funcationality like intergration with Nexpose. /etc/msf3/tools/ - various tools like lm2ntcrack.rb used to crack NTLM hashes Slide not part of SANS SEC560 14

Questions? Ready for the Demo? Live Demonstaration Use Nexpose to Scan Targets Use Nmap to Scan Targets Use Metasploit to exploit Targets Time Permitting - Scan a live host (that I own) using nmap and TOR Exit Nodes Videos of todays Demonstration will be posted online: http://www.liberterra.com Sign up for the Mentored SANS 560 here in KC - starting October 7, 2010 - http://www.sans.org/info/55868 Slide not part of SANS SEC560 15