SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
2010: and still bruteforcing
OWASP Webslayer


Christian Martorella
July 18th 2010
Barcelona
Who am I

Manager Auditoria
CISSP, CISA, CISM, OPST, OPSA,CEH
OWASP WebSlayer Project Leader
FIST Conference, Presidente
Edge-Security.com
Brute force attack

 Is a method to determine an unknown value by
 using an automated process to try a large
 number of possible values.
What can be bruteforced?
 Credentials (HTML Forms and HTTP)
 Session identifiers (session id’s)
 Predictable resource location (directories and files)
 Variable values
 Cookies
 WebServices methods (rest)
Where?

Headers
Forms (POST)
URL (GET)
Authentication (Basic, NTML)
How?
Dictionary attack
Search attack (all possible combinations of a
character set and a given length)
Rule based search attack (use rules to generate
candidates)
Why 2010 and still bruteforcing?


 In 2007 Gunter Ollmann proposed a series of
 countermeasures to stop automated attack tools.
Countermeasures

Block HEAD requests
Timeouts and thresholds
Referer checks
Tokens
Countermeasures
Turing tests (captchas)
Honeypot links
One time links
Custom messages
Token resource metering (Hashcash)
Countermeasures
Workarounds
Workarounds
Captcha breakers
Workarounds
Distributing scanning source traffic

                        Proxy
                        HTTP
                          1

                        Proxy
  Attacker                            Target
                        HTTP
                          ...

                        Proxy
                        HTTP
                          N
Workarounds
Distributing scanning on different targets


                           Target-server-1



     Attacker              Target-server-2



                           Target-server-3
Workarounds
Diagonal scanning (different username/password
each round)
Horizontal scanning (different usernames for
common passwords)
Three dimension ( Horizontal,Vertical or Diagonal +
Distributing source IP)
Four dimensions ( Horizontal, Vertical or Diagonal +
time delay)
2010...


114.000 emails
https://dcp2.att.com/OEPClient/openPage?ICCID=NUMBER&IMEI=0
2010...
                 Access Any Users Photo Albums




http://www.facebook.com/album.php?aid=-3&id=1508034566&l=aad9c
aid=-3 (-3 for every public profile album)
id=0123456789
l=? (all we know is its 5 characters from the 0123456789abcdef range)
2010...
•The 500 worst passwords list
•Alyssa banned passwords list
•Cain’s list of passwords
•Conficker’s list
•The English dictionary
•Faithwriters banned passwords list
•Hak5’s list
•Hotmail’s banned passwords list
•Myspace’s banned passwords list
•PHPbb’s compromised list
•RockYou’s compromised list
•Twitter’s banned passwords list
2010...
2010...
                                   Webservices
                                                 OK:0:username
 http://l33.login.scd.yahoo.com/
                                                 ERROR:101:Invalid
config/isp_verify_user?
                                                 Password
l=USERNAME&p=PASSWORD
                                                 ERROR:102:Invalid
                                                 Login
2010...
                             Password bruteforce




                                                       946 tries


python wfuzz.py -c -z file -f wordlists/common.txt --hc 200 -
d"email=securik@gmail.com&input_password=FUZZ&timezone=1" "https://www.tuenti.com/?
m=Login&func=do_login"
Tools


Automated scanning tools are designed to take full
advantage of the state-less nature of the HTTP
protocol and insecure development techniques.
Tools




  Evolution of WFUZZ
Webslayer

The main objective is to provide to the security tester
a tool to perform highly customized brute force
attacks on web applications, and a useful results
analysis interface. It was designed thinking in the
professional tester.
Webslayer
Webslayer

Predictable credentials (HTML Forms and HTTP)

Predictable sessions identifier (cookies,hidden fields, url)

Predictable resource location (directories and files)

Variables values and ranges

Cookies

WebServices methods

Traversals, Injections, Overflows, etc
Webslayer

 Encodings: 15 encodings supported

 Authentication: supports Ntml and Basic (known or guess)

 Multiple payloads: you can use 2 payloads in different parts

 Proxy support (authentication supported)

 Multithreads

 Multiple filters for improving the performance and for producing cleaner
 results
Webslayer

Predictable resource location: Recursion, common extensions, non standard
code detection, (Huge collection of dictionaries)

Advanced payload generation

Live filters

Session saving/restoring

Integrated browser (webKit)

Full page screenshot
Resource location prediction

 Based on the idea of Dirb (Darkraver)

 Custom dictionaries of know resources or common passwords

    Servers: Tomcat,Websphere,Weblogic,Vignette,etc

    Common words: common (950), big (3500), spanish

    CGIs (vulnerabilities)

    Webservices

    Injections (SQL, XSS, XML,Traversals)
Payload Generation

Payload generator:
 Usernames

 Credit Card numbers

 Permutations

 Character blocks

 Ranges

 Files

 Pattern creator and regular expression (encoders)
Demo
Advanced uses

Sweep an entire range with a common dictionary


HTTP://192.168.1.FUZZ/FUZ2Z
FUZZ: RANGE [1-254]
FUZ2Z: common.txt
Advanced uses

Scanning through proxies


                          me ----> Server w/proxy ---->LAN

wfuzz -x serverip:53 -c -z range -r 1-254 --hc XXX -t 5 http://10.10.1.FUZZ

-x set proxy
--hc is used to hide the XXX error code from the results, as machines w/o webserver
will fail the request.
Future features

 Time delay between request
 Multiple proxies (distribute attack)
 Diagonal scanning (mix dictionaries)
?
Contact

cmartorella _at_s21sec.com
cmartorella_at_edge-security.com
http://twitter.com/laramies
http://laramies.blogspot.com
http://www.edge-security.com
References
http://www.owasp.org/index.php/Testing_for_Brute_Force_(OWASP-AT-004)

http://projects.webappsec.org/Predictable-Resource-Location

http://projects.webappsec.org/Credential-and-Session-Prediction

http://projects.webappsec.org/Brute-Force

http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html

http://gawker.com/5559346/

http://tacticalwebappsec.blogspot.com/2009/09/distributed-brute-force-attacks-against.html

http://praetorianprefect.com/archives/2010/06/114000-ipad-owners-the-script-that-harvested-their-
e-mail-addresses/

http://www.securitybydefault.com/2009/07/no-no-uses-captchas-ni-ningun-otro.html

http://nukeit.org/facebook-hack-access-any-users-photo-albums/

Contenu connexe

Tendances

Tom Critchlow - Data Feed SEO & Advanced Site Architecture
Tom Critchlow - Data Feed SEO & Advanced Site ArchitectureTom Critchlow - Data Feed SEO & Advanced Site Architecture
Tom Critchlow - Data Feed SEO & Advanced Site Architecture
auexpo Conference
 
Metadata first, ontologies second
Metadata first, ontologies secondMetadata first, ontologies second
Metadata first, ontologies second
Joseba Abaitua
 

Tendances (20)

Sindice warehousing meetup
Sindice warehousing meetupSindice warehousing meetup
Sindice warehousing meetup
 
What happened to the Semantic Web?
What happened to the Semantic Web?What happened to the Semantic Web?
What happened to the Semantic Web?
 
Harnessing The Power of Search - Liferay DEVCON 2015, Darmstadt, Germany
Harnessing The Power of Search - Liferay DEVCON 2015, Darmstadt, GermanyHarnessing The Power of Search - Liferay DEVCON 2015, Darmstadt, Germany
Harnessing The Power of Search - Liferay DEVCON 2015, Darmstadt, Germany
 
Semantic Web, e-commerce
Semantic Web, e-commerceSemantic Web, e-commerce
Semantic Web, e-commerce
 
The Semantic Web #5 - RDF (2)
The Semantic Web #5 - RDF (2)The Semantic Web #5 - RDF (2)
The Semantic Web #5 - RDF (2)
 
Linked Data and Tools
Linked Data and ToolsLinked Data and Tools
Linked Data and Tools
 
An introduction to Semantic Web and Linked Data
An introduction to Semantic Web and Linked DataAn introduction to Semantic Web and Linked Data
An introduction to Semantic Web and Linked Data
 
Liferay Search: Best Practices to Dramatically Improve Relevance - Liferay Sy...
Liferay Search: Best Practices to Dramatically Improve Relevance - Liferay Sy...Liferay Search: Best Practices to Dramatically Improve Relevance - Liferay Sy...
Liferay Search: Best Practices to Dramatically Improve Relevance - Liferay Sy...
 
(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages(Re-) Discovering Lost Web Pages
(Re-) Discovering Lost Web Pages
 
Tom Critchlow - Data Feed SEO & Advanced Site Architecture
Tom Critchlow - Data Feed SEO & Advanced Site ArchitectureTom Critchlow - Data Feed SEO & Advanced Site Architecture
Tom Critchlow - Data Feed SEO & Advanced Site Architecture
 
when the link makes sense
when the link makes sensewhen the link makes sense
when the link makes sense
 
Knowledge Integration in Practice
Knowledge Integration in PracticeKnowledge Integration in Practice
Knowledge Integration in Practice
 
Metadata first, ontologies second
Metadata first, ontologies secondMetadata first, ontologies second
Metadata first, ontologies second
 
Semantic Search on the Rise
Semantic Search on the RiseSemantic Search on the Rise
Semantic Search on the Rise
 
Semantic search: from document retrieval to virtual assistants
Semantic search: from document retrieval to virtual assistantsSemantic search: from document retrieval to virtual assistants
Semantic search: from document retrieval to virtual assistants
 
How to build your own google
How to build your own googleHow to build your own google
How to build your own google
 
Web3uploaded
Web3uploadedWeb3uploaded
Web3uploaded
 
Making things findable
Making things findableMaking things findable
Making things findable
 
Corrib.org - OpenSource and Research
Corrib.org - OpenSource and ResearchCorrib.org - OpenSource and Research
Corrib.org - OpenSource and Research
 
Wimmics Overview 2021
Wimmics Overview 2021Wimmics Overview 2021
Wimmics Overview 2021
 

En vedette

All your data are belong to us - FIST Conference 2007
All your data are belong to us - FIST Conference 2007All your data are belong to us - FIST Conference 2007
All your data are belong to us - FIST Conference 2007
Christian Martorella
 

En vedette (7)

All your data are belong to us - FIST Conference 2007
All your data are belong to us - FIST Conference 2007All your data are belong to us - FIST Conference 2007
All your data are belong to us - FIST Conference 2007
 
Wfuzz for Penetration Testers
Wfuzz for Penetration TestersWfuzz for Penetration Testers
Wfuzz for Penetration Testers
 
Playing in a Satellite environment
Playing in a Satellite environmentPlaying in a Satellite environment
Playing in a Satellite environment
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Python for Penetration testers
Python for Penetration testersPython for Penetration testers
Python for Penetration testers
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 

Similaire à 2011 and still bruteforcing - OWASP Spain

Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
Satish b
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 

Similaire à 2011 and still bruteforcing - OWASP Spain (20)

Romulus OWASP
Romulus OWASPRomulus OWASP
Romulus OWASP
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17
 
2 . web app s canners
2 . web app s canners2 . web app s canners
2 . web app s canners
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
Owasp top 10_openwest_2019
Owasp top 10_openwest_2019Owasp top 10_openwest_2019
Owasp top 10_openwest_2019
 
HTML5 hacking
HTML5 hackingHTML5 hacking
HTML5 hacking
 
Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
 
Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?
 
Spa Secure Coding Guide
Spa Secure Coding GuideSpa Secure Coding Guide
Spa Secure Coding Guide
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)
 
Building Client-Side Attacks with HTML5 Features
Building Client-Side Attacks with HTML5 FeaturesBuilding Client-Side Attacks with HTML5 Features
Building Client-Side Attacks with HTML5 Features
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
 
Lets Make our Web Applications Secure
Lets Make our Web Applications SecureLets Make our Web Applications Secure
Lets Make our Web Applications Secure
 
Building Secure User Interfaces With JWTs (JSON Web Tokens)
Building Secure User Interfaces With JWTs (JSON Web Tokens)Building Secure User Interfaces With JWTs (JSON Web Tokens)
Building Secure User Interfaces With JWTs (JSON Web Tokens)
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

2011 and still bruteforcing - OWASP Spain