Hackers and Hacking: 2.a Reconnaissance
Hackers and Hacking: 2.a Reconnaissance
After a plausible target system is successfully identified without tripping any security measures, the next step is to enumerate valid users or resources of the targeted host. The techniques of enumerations are specific to operating systems. Windows 2000 and Novell system both share the same vulnerability of null session. A hacker can easily create a null session remotely, and practically gain completely control of the entire system. On UNIX system, one can easily count on the classic tool, finger. finger can give almost all the information regarding users on a system. 2.b Windows 2000 Denial of service attacks are often accomplished by causing buffer overflows on the target systems. In comparison to Windows 2000s predecessor, Windows NT4, Windows 2000 is much more robust in handling buffer overflows, but no defense is perfect. One method of causing buffer overflows on Windows 2000 is to send massive IP or SYN fragment packets to the target system such that the amount of the packets overwhelms the target systems ability to reassemble the packets. Once a hacker successfully caused buffer overflows on a system, the system is practically vulnerable to all types of attacks. Once an attacker has gained a valid user account on a Windows 2000 system, one can take the advantage of privilege escalation, a system inherited problem in most operating systems today, to obtain the password hash of the administrator account. For instance, an attacker is able to execute a program as SYSTEM on the target system to trick the system to dump the password hash of the administrator. The attacker then is able to crack the password elsewhere. Some famous tools to obtain password hashes on Windows 2000 systems include pwdump2 and chntpw. 2.c UNIX As mentioned earlier, a buffer overflow can result in denial of service. In the case of UNIX systems, the consequence can be much more severe. For example, a hacker can simply send a large string to a known buffer, such as one in the sendmail, with /bin/sh embedded in the string. Because sendmail is running as root on the UNIX system, when the buffer overflows occur, sendmail will blindly process the large string as a system command and thus giving the attacker a shell access with root privileges. Besides the typical buffer overflowing attacks, one can also exploit programs that deal with input validations, such as web servers. The most infamous one is the PHF vulnerability. This attack is rather dated, but it perfectly demonstrates how input validation attacks functions. PHF is a CGI script that came standard with early
versions of Apache server. The program did not properly parse the input strings, and consequently, it accepted system commands and allowed it to be executed on the server via the web server service which is typically run with root privilege. Though PHF is no longer insecure, other CGI scripts still inherit the same problem today due to bad programming practice or improper installations of the web servers.
4. Conclusion
Though there are literally thousands of ways and tools to cracking any known systems, it is unlikely that one is able to learn all of them. This report is only introductory in respect. From the software development point of view, there is no 100% secure design without compromising the usability of the software. The software designs and implementations will continue to evolve, but so will the methods and tools of hacking. To a certain degree, hacking can be considered proper and ethical only if the intensions are to learn and to discover security weaknesses. To err is human. After all, software is written by humans, thus mistakes are inevitable. On the other hand, hackings are inevitable due to humans greed for power and control. The battle between the good and evil will continue. Learn from the past mistakes and never repeat them.
References
1. Joel Scambray, Stuart McClure, George Kurtz, Hacking Exposed Second Edition, McGraw-Hill 2001 2. Pekka Himanen, The Hacker Ethic, Random House 2001 3. Jermey Quittner, Hacker Psych 101, http://tlc.discovery.com/convergence/hackers/articles/psych.html 4. J. A. N. Lee, Hacking, http://courses.cs.vt.edu/~cs3604/lib/Hacking/MacMillan.Hacking.html, Jan. 23 1991