SlideShare a Scribd company logo
Sembang2 Keselamatan It [email_address]
S pea K er Call me S.K. While in UTM: Modify virus source code and spread it to Tar College, crack Virus Buster™ for fun After UTM: Start up SCAN Associates Legally do pen-test for many agencies Document hacking tricks and share with    friends Advertisement
Publications SQL Injection Walkthrough , published in more than a dozen security web site Win32 Buffer Overflow Walkthrough , details the process of buffer overflow Thanks  from Microsoft™ for finding bug in their software Creating firewall proof  shellcode  in  Blackhat  and soon in  Ruxcon  conference Winner of Blackhat  Hacking game ! Advertisement
Wat we wanna do today? Appetizer has: some new terminologies a bit of concepts a few easy to use tools Main course: Treat Vulnerability Exploitation A bit of SQL injection Dessert: demo on some tricks/tools TOC
Threat If there is a computer, there is a threat… If there are 2 computers, there are 2 times threats… If there are N computers, there are N x threats… The more computers you hafta manage, the more risk there is… Threat
Threat, seriously… Running background services Services running all the time Allow direct connection from anywhere Favorite targets: HTTP (port 80) FTP (port 21) NetBIOS (port 135, 445) HTTPS (port 443) SSH (port 22), etc Threat
More threats… Mistake and Configuration errors: No password User name = password Write access allowed Default Public/Private community string Poor Access Control in proxy server Testing server in public network Existing of  default account Threat
Threats from within… End-user attacks: Email attachments User download trojan horse File sharing tool like Kazaa Not to mention Instant Messaging and IRC Unprotected Wi-Fi Access Point Threat
Vulnerability Software bug leads to vulnerability, vulnerability leads to system hack Thus, software bug is our friend Find the bug, you will find the way in Fortunate for us, security experts publish new vulnerability  everyday Our objective is to find a system with any vulnerability Vulnerability
Finding vulnerability The easy way: nessus – general purpose vuln scanner nikto – web attack scanner The semi-automatic approach: nmap – port scanner sl – port scanner for windoze The free-styler: netcat your favorite browser Vulnerability
nessus General purpose vulnerability scanner http://www.nessus.org GNU Public License Test hundreds of vulnerabilities effortlessly Can write your own plug-in using NASL Test only, will not let you control the server Vulnerability - The easy way
nessus client-server Nessus Client (Unix) Nessus Server (Unix) Targets Nessus Client (Windows) Targets Vulnerability - The easy way
nikto Web scanner http://www.cirt.net/code/nikto.shtml Open source (GPL) Over 2600 vulnerabilities specific to Web only Support HTTPS connection to avoid IDS detection Test only, will not let you control the server Vulnerability - The easy way
Other Tools General purpose scanner Internet Security Scanner ( www.iss.net) Eeye’s Retina ( www.eeye.com) Web Server Scanner  Stealth HTTP Scan ( www.hideaway.net) Whisker ( www.wiretrip.net/rfp/p/doc.asp/i2/d21.htm ) Vulnerability - The easy way
Port Scanner  Tell you what type of services are running in a server Indirectly tell you the OS too nmap www.insecure.org/nmap/ Versatile port scanner for *nix sl www.foundstone.com easy to use port scanner for windoze Vulnerability - semi-automatic
Favorite targets Port 53 – try bind exploit Port 21 – try anonymous login, simple passwd or exploits for Pro-Ftp, Wu-ftp, serv-u, etc Port 22 – try simple passwd and x2 exploit Port 25 – sendmail exploit for slackware or exchange exploit Port 80 – Apache chunked bug, IIS .printer, unicode, ASP chunked, Webdav, Frontpage, etc. Port 135, 445 – try netbios sharing with simple passwd or Locator, Dcom, messenger, workstation, Lsass exploits Port 443 – SSL-too-open, THCISSLame.c Port 1433, 1434 – MS Sql Server Resolution Bug,  HelloBug or SA without password Vulnerability - semi-automatic
Free styler Using netcat to connect to popular services and backdoor port: port 22 review SSH version port 1080 might allow you to connect to internal IP port 5554 might drop you a shell Use your favorite browser to surf around the target web server, look for: Hidden info in HTML code Web attack via SQL injection, PHP, Perl, etc Vulnerability
Exploitation The process of taking advantage of a vulnerability to either: Get a shell (thus, control the victim) Retrieve/modify information (source code, files, database) Denial of Service (DOS), etc To get an exploit: Find/trade from www/irc/friends Create it yourself Purchase it from Core Impact or    CANVAS Exploitation
Find from Internet www.metasploit.com   Bugtraq Mailing list  Full Disclosure Mailing list  http:// packetstormsecurity.nl / http:// www.security.nnov.ru/search/exploits.asp   #vuln, #badcode, #darknet, #phrack Exploitation
Creating it yourself Read and understand the vulnerability from the advisory: www.securitytracker.com www.microsoft.com/security Might require different skill set in: Perl/PHP/SQL Reverse engineering C or ASM programming, etc Exploitation
metasploit www.metasploit.com Developed by HD Moore and a few ghettohackers (they won Defcon Ctf 3 times in a row) Integrated many exploits in one easy to use package Support command line and web interface Packed with many useful component for exploit development Its free! Exploitation
Web attack Developers are putting more functionality into Web (port 80) There are many type of attacks specific to port 80 alone: SQL injection Perl and CGI insecurities PHP insecurities Cross scripting (XSS) Web attack
SQL Injection A technique to manipulate data in a way that it will change the original SQL statement It could happened in the following manner: Program takes your input as a variable It appends your input into an SQL statement The program then pass the statement to    the Database Web attack
...SQL Injection What if your input is an SQL command? By carefully insert SQL command as your input, you can change the original SQL statement to something else and make the Database to execute your command Usual command to test for SQL injection: Type a single quote as input (‘) Type “ union select 1” to see if injection is possible Web attack
Perl & CGI File access problem User supply variable which in turn used by Perl/CGI to open a file Manipulating this variable may allow you to open any file or even remote execution Web attack
PHP Just like Perl/CGI, only more powerful (in a sense of hacking) Not only you may manipulate variable to open any file, you also can control it to open any file in the Internet Web attack
XSS Allow injection of HTML code (including Javascript/VBScript) into existing HTML page If a user open the page, your code execute Best used in Forum, to steal user cookie Web attack
Can we go now? Q & A Session Thanks

More Related Content

PPT
Freeware Security Tools You Need
PPTX
Basic Malware Analysis
PPT
Automated Penetration Testing With The Metasploit Framework
PPTX
Apache Struts2 CVE-2017-5638
PPTX
Metasploit for Web Workshop
PPTX
DC612 Day - Hands on Penetration Testing 101
PPTX
Malware analysis
Freeware Security Tools You Need
Basic Malware Analysis
Automated Penetration Testing With The Metasploit Framework
Apache Struts2 CVE-2017-5638
Metasploit for Web Workshop
DC612 Day - Hands on Penetration Testing 101
Malware analysis

What's hot (20)

PPTX
Automating Malware Analysis
PPTX
Automating malware analysis
PDF
Xss 101 by-sai-shanthan
PPTX
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
PDF
Pentesting with Metasploit
PPTX
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
PPTX
Basic malware analysis
PPTX
Reversing malware analysis training part10 exploit development basics
PPTX
Metasploit For Beginners
PPTX
Intro to Malware Analysis
PPTX
Reverse Engineering Malware
PPTX
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
PPTX
"Introduction to Bug Hunting", Yasser Ali
PDF
Understanding CryptoLocker (Ransomware) with a Case Study
PPTX
Reverse engineering malware
PDF
Fileless Malware Infections
PDF
SSMF (Security Scope Metasploit Framework) - Course Syllabus
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
PPTX
Reversing malware analysis training part1 lab setup guide
PDF
Metasploit Humla for Beginner
Automating Malware Analysis
Automating malware analysis
Xss 101 by-sai-shanthan
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Pentesting with Metasploit
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Basic malware analysis
Reversing malware analysis training part10 exploit development basics
Metasploit For Beginners
Intro to Malware Analysis
Reverse Engineering Malware
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
"Introduction to Bug Hunting", Yasser Ali
Understanding CryptoLocker (Ransomware) with a Case Study
Reverse engineering malware
Fileless Malware Infections
SSMF (Security Scope Metasploit Framework) - Course Syllabus
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Reversing malware analysis training part1 lab setup guide
Metasploit Humla for Beginner
Ad

Viewers also liked (6)

PPT
香港六合彩-六合彩
PDF
Building and Protecting your Brand in the Digital Age
PPT
Galeria De Fotos
PPS
AutomóVeis EléCtricos Abatidos
香港六合彩-六合彩
Building and Protecting your Brand in the Digital Age
Galeria De Fotos
AutomóVeis EléCtricos Abatidos
Ad

Similar to Sembang2 Keselamatan It 2004 (20)

PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PPTX
VAPT_FINAL SLIDES.pptx
PPTX
VAPT PRESENTATION full.pptx
PPT
PPTX
Secure programming with php
PPT
Hacking and its Defence
PPTX
Two-For-One Talk: Malware Analysis for Everyone
PPT
Hacking tutorial
PPTX
Introduction to penetration testing
PPT
Andrews whitakrer lecture18-security.ppt
PPT
Penetration Testing Basics
PDF
Dev and Blind - Attacking the weakest Link in IT Security
PPT
BSidesJXN 2017 - Improving Vulnerability Management
PPT
Penetration testing, What’s this?
PPT
The Top 10/20 Internet Security Vulnerabilities – A Primer
PDF
TRISC 2010 - Grapevine , Texas
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
VAPT_FINAL SLIDES.pptx
VAPT PRESENTATION full.pptx
Secure programming with php
Hacking and its Defence
Two-For-One Talk: Malware Analysis for Everyone
Hacking tutorial
Introduction to penetration testing
Andrews whitakrer lecture18-security.ppt
Penetration Testing Basics
Dev and Blind - Attacking the weakest Link in IT Security
BSidesJXN 2017 - Improving Vulnerability Management
Penetration testing, What’s this?
The Top 10/20 Internet Security Vulnerabilities – A Primer
TRISC 2010 - Grapevine , Texas

More from Linuxmalaysia Malaysia (20)

PDF
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
PDF
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
PDF
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
PDF
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
PDF
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
PDF
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
PDF
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
PDF
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
PDF
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
PDF
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
PDF
Introduction To ICT Security Audit OWASP Day Malaysia 2011
PDF
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
PDF
OSDC.my Master Plan For Malaysia Open Source Community
PDF
33853955 bikesh-beginning-smart-phone-web-development
PDF
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
PDF
DNS solution trumps cloud computing competition
PDF
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
PDF
Benchmarking On Web Server For Budget 2008 Day
PDF
Sesuaikan Masa Sempena 2010
ODT
OSS Community In Malaysia 2009 List
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
OSDC.my Master Plan For Malaysia Open Source Community
33853955 bikesh-beginning-smart-phone-web-development
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
DNS solution trumps cloud computing competition
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Benchmarking On Web Server For Budget 2008 Day
Sesuaikan Masa Sempena 2010
OSS Community In Malaysia 2009 List

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
A Presentation on Artificial Intelligence
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
A Presentation on Artificial Intelligence
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Modernizing your data center with Dell and AMD
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx

Sembang2 Keselamatan It 2004

  • 1. Sembang2 Keselamatan It [email_address]
  • 2. S pea K er Call me S.K. While in UTM: Modify virus source code and spread it to Tar College, crack Virus Buster™ for fun After UTM: Start up SCAN Associates Legally do pen-test for many agencies Document hacking tricks and share with friends Advertisement
  • 3. Publications SQL Injection Walkthrough , published in more than a dozen security web site Win32 Buffer Overflow Walkthrough , details the process of buffer overflow Thanks from Microsoft™ for finding bug in their software Creating firewall proof shellcode in Blackhat and soon in Ruxcon conference Winner of Blackhat Hacking game ! Advertisement
  • 4. Wat we wanna do today? Appetizer has: some new terminologies a bit of concepts a few easy to use tools Main course: Treat Vulnerability Exploitation A bit of SQL injection Dessert: demo on some tricks/tools TOC
  • 5. Threat If there is a computer, there is a threat… If there are 2 computers, there are 2 times threats… If there are N computers, there are N x threats… The more computers you hafta manage, the more risk there is… Threat
  • 6. Threat, seriously… Running background services Services running all the time Allow direct connection from anywhere Favorite targets: HTTP (port 80) FTP (port 21) NetBIOS (port 135, 445) HTTPS (port 443) SSH (port 22), etc Threat
  • 7. More threats… Mistake and Configuration errors: No password User name = password Write access allowed Default Public/Private community string Poor Access Control in proxy server Testing server in public network Existing of default account Threat
  • 8. Threats from within… End-user attacks: Email attachments User download trojan horse File sharing tool like Kazaa Not to mention Instant Messaging and IRC Unprotected Wi-Fi Access Point Threat
  • 9. Vulnerability Software bug leads to vulnerability, vulnerability leads to system hack Thus, software bug is our friend Find the bug, you will find the way in Fortunate for us, security experts publish new vulnerability everyday Our objective is to find a system with any vulnerability Vulnerability
  • 10. Finding vulnerability The easy way: nessus – general purpose vuln scanner nikto – web attack scanner The semi-automatic approach: nmap – port scanner sl – port scanner for windoze The free-styler: netcat your favorite browser Vulnerability
  • 11. nessus General purpose vulnerability scanner http://www.nessus.org GNU Public License Test hundreds of vulnerabilities effortlessly Can write your own plug-in using NASL Test only, will not let you control the server Vulnerability - The easy way
  • 12. nessus client-server Nessus Client (Unix) Nessus Server (Unix) Targets Nessus Client (Windows) Targets Vulnerability - The easy way
  • 13. nikto Web scanner http://www.cirt.net/code/nikto.shtml Open source (GPL) Over 2600 vulnerabilities specific to Web only Support HTTPS connection to avoid IDS detection Test only, will not let you control the server Vulnerability - The easy way
  • 14. Other Tools General purpose scanner Internet Security Scanner ( www.iss.net) Eeye’s Retina ( www.eeye.com) Web Server Scanner Stealth HTTP Scan ( www.hideaway.net) Whisker ( www.wiretrip.net/rfp/p/doc.asp/i2/d21.htm ) Vulnerability - The easy way
  • 15. Port Scanner Tell you what type of services are running in a server Indirectly tell you the OS too nmap www.insecure.org/nmap/ Versatile port scanner for *nix sl www.foundstone.com easy to use port scanner for windoze Vulnerability - semi-automatic
  • 16. Favorite targets Port 53 – try bind exploit Port 21 – try anonymous login, simple passwd or exploits for Pro-Ftp, Wu-ftp, serv-u, etc Port 22 – try simple passwd and x2 exploit Port 25 – sendmail exploit for slackware or exchange exploit Port 80 – Apache chunked bug, IIS .printer, unicode, ASP chunked, Webdav, Frontpage, etc. Port 135, 445 – try netbios sharing with simple passwd or Locator, Dcom, messenger, workstation, Lsass exploits Port 443 – SSL-too-open, THCISSLame.c Port 1433, 1434 – MS Sql Server Resolution Bug, HelloBug or SA without password Vulnerability - semi-automatic
  • 17. Free styler Using netcat to connect to popular services and backdoor port: port 22 review SSH version port 1080 might allow you to connect to internal IP port 5554 might drop you a shell Use your favorite browser to surf around the target web server, look for: Hidden info in HTML code Web attack via SQL injection, PHP, Perl, etc Vulnerability
  • 18. Exploitation The process of taking advantage of a vulnerability to either: Get a shell (thus, control the victim) Retrieve/modify information (source code, files, database) Denial of Service (DOS), etc To get an exploit: Find/trade from www/irc/friends Create it yourself Purchase it from Core Impact or CANVAS Exploitation
  • 19. Find from Internet www.metasploit.com Bugtraq Mailing list Full Disclosure Mailing list http:// packetstormsecurity.nl / http:// www.security.nnov.ru/search/exploits.asp #vuln, #badcode, #darknet, #phrack Exploitation
  • 20. Creating it yourself Read and understand the vulnerability from the advisory: www.securitytracker.com www.microsoft.com/security Might require different skill set in: Perl/PHP/SQL Reverse engineering C or ASM programming, etc Exploitation
  • 21. metasploit www.metasploit.com Developed by HD Moore and a few ghettohackers (they won Defcon Ctf 3 times in a row) Integrated many exploits in one easy to use package Support command line and web interface Packed with many useful component for exploit development Its free! Exploitation
  • 22. Web attack Developers are putting more functionality into Web (port 80) There are many type of attacks specific to port 80 alone: SQL injection Perl and CGI insecurities PHP insecurities Cross scripting (XSS) Web attack
  • 23. SQL Injection A technique to manipulate data in a way that it will change the original SQL statement It could happened in the following manner: Program takes your input as a variable It appends your input into an SQL statement The program then pass the statement to the Database Web attack
  • 24. ...SQL Injection What if your input is an SQL command? By carefully insert SQL command as your input, you can change the original SQL statement to something else and make the Database to execute your command Usual command to test for SQL injection: Type a single quote as input (‘) Type “ union select 1” to see if injection is possible Web attack
  • 25. Perl & CGI File access problem User supply variable which in turn used by Perl/CGI to open a file Manipulating this variable may allow you to open any file or even remote execution Web attack
  • 26. PHP Just like Perl/CGI, only more powerful (in a sense of hacking) Not only you may manipulate variable to open any file, you also can control it to open any file in the Internet Web attack
  • 27. XSS Allow injection of HTML code (including Javascript/VBScript) into existing HTML page If a user open the page, your code execute Best used in Forum, to steal user cookie Web attack
  • 28. Can we go now? Q & A Session Thanks