Ethical Hacking and Intrusion Detection/ Forensics: Instructor: Dr. Avinash Srinivasan Module-2 Chapter-2
Ethical Hacking and Intrusion Detection/ Forensics: Instructor: Dr. Avinash Srinivasan Module-2 Chapter-2
Avinash Srinivasan
Module-2 Chapter-2
Chapter Objectives
Vulnerability Research
Vulnerability Research
DarkReading (http://www.darkreading.com)
Exercise 2.1
Researching Vulnerabilities
Hacker-Storm Open Source Vulnerability Database (OSVDB)
Steps
1.
2.
Figure 3.1
Steps
3.
Click OSVDB GUI download (see Figure 3.2), saving the file to the
Hackerstorm folder you created. Unzip the files to the folder.
4.
Click OSVDB current database download (see figure 3.2), save the
file to the Hackerstorm folder you created, and unzip the files to
the folder. Choose Yes to All when prompted about overwriting
files.
Figure 3.2
9
Steps
5.
Figure 3.3
10
Steps
6.
Click the OSVDB Search button at the bottom (see figure 3.4).
Scroll through the vendors on the left, choose Mozilla
Organization, and then click the View button.
Figure 3.4
11
Steps
7.
12
What is CSIRT?
Footprinting
14
Overview
First step in information gathering provides a highlevel blueprint of the target system or network.
15
Overview
16
Footprinting:
an effort to map out, at a high level, what the
landscape looks like.
Reconnaissance:
overall, over-arching term for gathering information
on targets.
17
Footprinting
18
Footprinting Types
19
Passive Footprinting
20
Passive Footprinting
21
Wayback Machine
22
Archive.org
23
24
25
26
27
Read Notify
WhoReadMe
MSGTAG
Trace Email
Zendio
28
Exercise 2.2
Using MailTracker to Footprint E-mail
2.
Log in to www.mailtracking.com
3.
4.
30
mailtracking.com
31
32
Forwarded
33
Summary
34
Google Alerts
Yahoo! Site Explorer
SEO for Firefox
SpyFu
Quarkbase
DomainTools.com
35
Active Footprinting
36
Active Footprinting
Active Footprinting:
requires attacker to touch the device or the network.
Example: running a scan against an IP you find on the
network
37
38
DNS Basics
39
40
41
DNS Namespace
Each server holds and manages the records for its own
little corner of the world known as a namespace.
42
DNS Records
DNS Record:
Gives directions to or for a specific type of resource
Can provide
IP add. for individual systems within your network
addresses for your e-mail servers
pointers to other DNS servers
43
44
45
46
47
48
http://www.ibiblio.org/gdunc/netone/ms_netency/netencyhtml/c0Z613788.htm
49
Note
50
Source Host
Host name of the SOA server.
Contact Email
E-mail add. of the person responsible for the zone file.
Serial Number
Revision number of the zone file.
Increments each time the zone file changes.
Refresh Time
Amount of time a secondary DNS server will wait
before asking for updates.
51
SOA Record
Retry Time
Amount of time a secondary server will wait to retry
if zone transfer fails.
Expire time
Maximum amount of time a secondary server will
spend trying to complete a zone transfer.
TTL (Time to Live)
Has the minimum TTL for all records in the zone.
If not updated by a zone transfer, they will perish.
52
Illustrative Example
1.
2.
3.
4.
http://www.securetoday.net/tag/dns-spoofing/
53
Exercise 2.3
Demonstrating DNS Attack Results
54
Exercise Overview
55
Steps
1.
2.
3.
Steps
3.
4.
5.
Open the hosts file in Notepad and save a copy before you begin.
In the hosts file, enter 209.191.122.70 www.google.com
underneath the last line in the file
a. The last line will show 127.0.0.1 or ::1, or both
b. Save the file and exit.
Open a new browser session and try to access www.google.com.
a. Your browser displays Yahoo!s search engine this time.
b. Updating the hosts file provided a pointer to Yahoo!s address,
which preempted the lookup for Google.
Note: Be sure to clear the entry you added to the hosts file. In case
something goes wrong, you have a backup that you made earlier.
57
nslookup
dig
58
61
62
whois
Exercise
64
66