SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Don‘t scan, just ask
A new approach of identifying vulnerable web applications




Fabian Mihailowitsch               28th Chaos Communication Congress, 12/28/11 - Berlin
Summary

It’s about identifying web applications and systems…
Classical network reconnaissance techniques mostly rely on technical facts, like net blocks or
URLs. They don’t take the business connections into view and hence don’t identify all potential targets.
Therefore ‘Spider-Pig’ was developed. A tool that searches for web applications connected to a
company based on a scored keyword list and a crawler. That way web application run by satellite
companies or service providers can be identified as well.




TABLE OF CONTENTS
 Overview on classical network reconnaissance
 Restrictions and possible enhancements
 Presentation of ‘Spider-Pig’ and its approach
 Statistics of a real-life scenario
 Conclusion




Fabian Mihailowitsch                                   28th Chaos Communication Congress, 12/28/11 - Berlin
Classical network reconnaissance


 TECHNIQUES
  Query NIC and RIPE databases
  Reverse DNS
  DNS Zone Transfer
  Research in forums, social networks, …
  Google hacking
  Identify routing and hence new systems
  Brute-Force DNS
 …

 TOOLS
  whois, dig, web browser, Maltego, …




Fabian Mihailowitsch                     28th Chaos Communication Congress, 12/28/11 - Berlin
How Business looks like…

                       Company A.0                            THE TARGET :)




SATELLITE COMPANIES
 Branch office
 Partner firm

 Company A.1




                                           SERVICE PROVIDER       Company B
                                            Payment Provider
                                            Separate Webhoster
                                            Marketing Campaign
                                            Service Center
                                           …




Fabian Mihailowitsch                 28th Chaos Communication Congress, 12/28/11 - Berlin
…what we see with network reconnaissance

                       Company A.0                            ALL (?)
                                                               Net blocks
                                                               IP addresses
                                                               URLs
                                                               DNS information
SOME (!)
 Net blocks
 IP addresses
 URLs
 DNS information
Company A.1




                                                                  Company B




Fabian Mihailowitsch                 28th Chaos Communication Congress, 12/28/11 - Berlin
Restrictions and possible enhancements

Restrictions                                    Enhancements
Scans solely on a technical level:              For an attacker it doesn’t count whether he
- IPs                                           attacks company A or B:
- Net blocks                                    - Access to sensitive data
- URLs                                          - Reputational damage
                                                -…
No business relations are taken into account.
                                                Take business relationships into account.
Potentially incomplete view:
You can only search for what you know              Build a logical network between systems,
(e.g. RIPE queries).                               independent of the owner.

Probably just one company in focus.               Identify (all) applications / systems linked
                                                to a company based on a business
                                                connection level, independent of provider.




Not all targets are identified!                 Development of ‘Spider-Pig’.


Fabian Mihailowitsch                            28th Chaos Communication Congress, 12/28/11 - Berlin
Approach of Spider-Pig
Spider-Pig identifies web applications connected to a company in an automated manner and hence
allows to identify potential targets (web applications and systems) for further attacks.
Due to German laws the tool will not be released to public. But its methodology will be explained…


     1. Model Business        2. Perform Search         3. Calculate Results             4. Exploit


Model the business,       Based on the               Duplicates are              Targets are sent to a
services and              keywords, different        removed from the            custom vulnerability
relationships of the      search engines a           results. For each           scanner that uses the
company in scope.         queried in an              domain a score is           data from the crawling
                          automated manner.          calculated and a sorted     phase and attacks the
Based on a scored                                    list with the results is    web sites in an
keyword list with         Furthermore ‘whois         generated.                  automated manner.
terms, like company       information’ are
name, product names,      gathered for the           Top results are             At the end, we
tax numbers.              identified domains and     reviewed manually and       hopefully get a shell! :)
                          IP addresses.              potential targets are
Note: No technical                                   extracted.
details (e.g. IPs) have   Identified web sites are
to be provided.           crawled for links to
                          new web pages.

Fabian Mihailowitsch                                  28th Chaos Communication Congress, 12/28/11 - Berlin
First step: Model Business

Idea
 Web applications connected to a company contain terms like company name, products or imprint.
 There are imprecise terms like products names that lead to many web sites (e.g. Amazon).
 There are precise and very specific terms like tax numbers or imprints that lead to company pages.


Solution
 Manually assemble a list that contains terms specific to the company in focus.
 Assign each entry a score, how unique and specific it is.




Note: Experience showed that ~200 terms are sufficient and already lead to hundreds thousands of
results. Technical details (e.g. URLs or software used) can be used but don’t have to. A score from 1-100
works pretty well, but can be adopted.


Fabian Mihailowitsch                                    28th Chaos Communication Congress, 12/28/11 - Berlin
Second step: Perform Search

Idea
 Keywords are used to query different search engines (e.g. Google, Bing, Yahoo).
 Results are read and a list is built, where the fully qualified domain name (FQDN) is the index.
 Every time the FQDN is part of a search result, the score assigned to this search item is added.
 For the IP and domain name a ‘whois query’ is executed to get details on the owner.
 If the whois record contains the company name, address or a keyword, the FQDN is as hit.

                                                       1. Take                  2. Query
                                                       keyword                   search
                                                       from list                engines
         Example: If you focus on a certain
         market (e.g. Europe) you can exclude
         all other results based on the
         ‘CountryCode’ received via whois.
                                                                                      3. Check
                                                    5.
                                                                                       results
                                                Additional
                                                                                      and calc.
                                                  steps
                                                                                        score

                                                                                             Note: Using the FQDN as identifier,
                                                                   4. Perform
                                                                      whois                  already removes duplicates and
                                                                      query                  speeds up the process.

 FQDN                  IP               URL                                                Title                       Score       Hit

 www.a.com             1.2.3.4          http://www.a.com/about                             Company A                   10          N
                                                                                                                       (9 + 1)
                                        http://www.a.com/product1                          View product1

Fabian Mihailowitsch                                                       28th Chaos Communication Congress, 12/28/11 - Berlin
Second step: Perform Search

Implementation Notes
 Search component was developed in Perl and is not more than 503 LOC :)
 Google and Bing are used as search engines.
 Results are stored in memory and wrote to disk in regular intervals.


Querying NIC and RIPE databases

Depending on the database, the results do have
different layouts. Consider this when parsing the
‘whois queries’.

If you query too fast, you’re getting blocked.
Hence you have to rotate the queried systems
or throttle the querying speed.

As the search results can easily consist of multiple
thousands of systems, consider that a small delay
per query will delay the whole process by days.




Fabian Mihailowitsch                                   28th Chaos Communication Congress, 12/28/11 - Berlin
Second step: Perform Search

Using search engines
For Perl there are many modules for different search engines. However most of them don’t work.
But ‘curl’ and some regular expressions are fine to implement it yourself.
Google covers pretty much, however Bing leads to some additional results.


Google                                                      Bing
 Google Custom Search API can be used                       Bing API is available
 1.000 queries / day are free                               An AppID is needed that can be requested
 If you want to use the service efficient, you             for free at Bing Developer Center
need to buy a search key, which is charged on                Service is free of charge, however the queries
the amount of search queries                                have to be throttled
 For a ‘normal’ search this should result in ~200$          Consider different markets (!) as they will lead
 Consider different languages (!) as they will             to diverse results and disable filter (!)
lead to diverse results and disable filter (!)


 Google:
 https://www.googleapis.com/customsearch/v1?q=[qry]&num=10&start=[pointer]&lr=[lang]&key=[...]&cx=[cx]&filter=0

 Bing:
 http://api.search.live.net/xml.aspx?Appid=[appid]&query=[qry]&sources=web&adult=off&market=[market]&web.count=5
 0&web.offset=[pointer]

Fabian Mihailowitsch                                        28th Chaos Communication Congress, 12/28/11 - Berlin
Second step: Crawl

Idea
 Search queries lead to a scored list of potential targets.
 The higher the score, the more probable the web page is connected to the company in focus.
 Company web pages probably link to new company web pages.
 Web pages with a high score (e.g. 200) should be crawled and checked for external links.


Crawling top scored web pages

Select certain systems from the list (see third step) and feed them to a
crawler.

The crawler then identifies new external links on these web pages
and hence receives new web applications that might be of interest.
These can be appended to the results list.

Furthermore the crawler can already perform the first step of the
vulnerability scan.




Fabian Mihailowitsch                                     28th Chaos Communication Congress, 12/28/11 - Berlin
Second step: Crawl

Credits
The vulnerability management
framework (pita) mentioned during
the talk hasn’t been developed by me.

It is the effort of multiple years of
development by various security
consultants working at diverse
companies and as freelancer!

For ‘Spider –Pig’ just some
modifications were made to base
components.



Crawler
 Written in Perl
 Identifies external links and adds
them to the results list
 Performs first step of VA

Fabian Mihailowitsch                    28th Chaos Communication Congress, 12/28/11 - Berlin
Third step: Calculate Results

Idea
 Now a scored list with all identified targets is available.
 If no filter is applied, the list contains hundreds thousands of results and cannot be checked manually.
 Results with a low score (e.g. <10) are probably not relevant.
 Results with a very high score are probably irrelevant, as they refer to Online Shops, Portals, etc.
 Hence just a small portion of the results has to be analyzed manually.

                          Score




                                  Interesting Results



                                                                                      Web page




Fabian Mihailowitsch                                     28th Chaos Communication Congress, 12/28/11 - Berlin
Fourth step: Exploit

Idea
 Now real targets have been identified that somehow are connected to the company in focus.
 Information regarding the content, forms, etc. have been saved in the database during the crawling.
 This basis can be used for an automated vulnerability scan.


pita
Note (again): The vulnerability management framework (pita) mentioned during the talk hasn’t been
developed by me. It is the effort of multiple years of development by various security consultants.

Based on the identified web applications and the data collected during the crawling (e.g. forms that can be
submitted), the vulnerability management framework ‘pita’ is started.

‘pita’ runs:
 Fuzzer (XSS, SQL Injection, …)
 Web Application Fingerprinter (wafp)
 Cookie/Session analyzer
 SSL tests
 3rd party tools (sqlmap, nmap, Nikto, …)


     At the end we get a report with all vulnerabilities, out of keywords… 
Fabian Mihailowitsch                                    28th Chaos Communication Congress, 12/28/11 - Berlin
Statistics

In case we would run ‘Spider-Pig’ against a big known company, we might
get the following results:
Keywords used             287
Duration (including VA)   7 days – it could be optimized :)
Costs                     ~200 Dollar - due to Google, without Google 0 Dollar
Unique FQDNs              150.871
FQDNs with filter         50.784 – after a filter for EU countries was applied
Applications reviewed     300
Confirmed applications    223
                           Marketing campaigns, customer service, official web pages, …
                           Applications were hosted on external and internal systems
                           Official web pages within top 10! It works! :)
Vulnerabilities           




Fabian Mihailowitsch                          28th Chaos Communication Congress, 12/28/11 - Berlin
Conclusion

Classical network reconnaissance doesn’t take all aspects into account and
hence does not identify all potential targets of a company in focus.



Development of ‘Spider-Pig’, a tool to model business connections.
 ‘Spider-Pig’ allows to identify web applications linked to a company due to their business connections.
 Based on a list of keywords – without any technical details – ‘Spider-Pig’ attacks companies.
 Besides assembling a list of keywords and a manual review of results, no human interaction is needed.
 ‘Spider-Pig’ collects some interesting statistics/information and offers new perspectives.




Companies should not only focus on protecting their own systems.
 An attacker will (most likely) take the easiest way.
 Companies should not only protect their own systems but choose service providers with caution.
 Sensitive information should not be spread across multiple systems and business partners.




Fabian Mihailowitsch                                    28th Chaos Communication Congress, 12/28/11 - Berlin
Thanks! Questions?
Contact me ‘fmihailowitsch [at] deloitte.de’




Credits
Richard Sammet, who developed the idea & tool with me!




Fabian Mihailowitsch                 28th Chaos Communication Congress, 12/28/11 - Berlin

Contenu connexe

En vedette

Vocab Lab/SNAP Lesson
Vocab Lab/SNAP LessonVocab Lab/SNAP Lesson
Vocab Lab/SNAP LessonAngela Peery
 
Generating Revenue Through Digital and Mobile Content
Generating Revenue Through Digital and Mobile ContentGenerating Revenue Through Digital and Mobile Content
Generating Revenue Through Digital and Mobile ContentAscend Integrated Media
 
Slide company profile firotek
Slide company profile firotekSlide company profile firotek
Slide company profile firoteksprint24
 
Write More to Learn More Handout
Write More to Learn More HandoutWrite More to Learn More Handout
Write More to Learn More HandoutAngela Peery
 
04 prim. pedra dispensari 13-02-10
04 prim. pedra dispensari 13-02-1004 prim. pedra dispensari 13-02-10
04 prim. pedra dispensari 13-02-10Rosa Sala Camprodon
 
Mendeley bàsic avançat.2016
Mendeley bàsic avançat.2016Mendeley bàsic avançat.2016
Mendeley bàsic avançat.2016Marta Macías
 
專題介紹
專題介紹專題介紹
專題介紹Aris Lee
 
TechYES project 1 final copy
TechYES project 1 final copyTechYES project 1 final copy
TechYES project 1 final copysmhenry17
 
擴充實境(Augmented reality)
擴充實境(Augmented reality)擴充實境(Augmented reality)
擴充實境(Augmented reality)Aris Lee
 
Common Formative Assessments Make a Difference
Common Formative Assessments Make a DifferenceCommon Formative Assessments Make a Difference
Common Formative Assessments Make a DifferenceAngela Peery
 
Detecting hardware keyloggers
Detecting hardware keyloggersDetecting hardware keyloggers
Detecting hardware keyloggersmihailowitsch
 

En vedette (11)

Vocab Lab/SNAP Lesson
Vocab Lab/SNAP LessonVocab Lab/SNAP Lesson
Vocab Lab/SNAP Lesson
 
Generating Revenue Through Digital and Mobile Content
Generating Revenue Through Digital and Mobile ContentGenerating Revenue Through Digital and Mobile Content
Generating Revenue Through Digital and Mobile Content
 
Slide company profile firotek
Slide company profile firotekSlide company profile firotek
Slide company profile firotek
 
Write More to Learn More Handout
Write More to Learn More HandoutWrite More to Learn More Handout
Write More to Learn More Handout
 
04 prim. pedra dispensari 13-02-10
04 prim. pedra dispensari 13-02-1004 prim. pedra dispensari 13-02-10
04 prim. pedra dispensari 13-02-10
 
Mendeley bàsic avançat.2016
Mendeley bàsic avançat.2016Mendeley bàsic avançat.2016
Mendeley bàsic avançat.2016
 
專題介紹
專題介紹專題介紹
專題介紹
 
TechYES project 1 final copy
TechYES project 1 final copyTechYES project 1 final copy
TechYES project 1 final copy
 
擴充實境(Augmented reality)
擴充實境(Augmented reality)擴充實境(Augmented reality)
擴充實境(Augmented reality)
 
Common Formative Assessments Make a Difference
Common Formative Assessments Make a DifferenceCommon Formative Assessments Make a Difference
Common Formative Assessments Make a Difference
 
Detecting hardware keyloggers
Detecting hardware keyloggersDetecting hardware keyloggers
Detecting hardware keyloggers
 

Similaire à Don't scan, just ask

Making Web Analytics actionable with Web Content Management
Making Web Analytics actionable with Web Content ManagementMaking Web Analytics actionable with Web Content Management
Making Web Analytics actionable with Web Content ManagementAmplexor
 
SHODAN- Defcon 18-schearer-shodan
SHODAN- Defcon 18-schearer-shodanSHODAN- Defcon 18-schearer-shodan
SHODAN- Defcon 18-schearer-shodanIvan Flores
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdfMarceloCunha571649
 
Co|Create Website Documentation Guidebook
Co|Create Website Documentation GuidebookCo|Create Website Documentation Guidebook
Co|Create Website Documentation GuidebookJon Wretlind, BFA, MDiv
 
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...Bryan Borra
 
Jeremy cabral search marketing summit - scraping data-driven content (1)
Jeremy cabral   search marketing summit - scraping data-driven content (1)Jeremy cabral   search marketing summit - scraping data-driven content (1)
Jeremy cabral search marketing summit - scraping data-driven content (1)Jeremy Cabral
 
27.2.12 lab interpret http and dns data to isolate threat actor
27.2.12 lab   interpret http and dns data to isolate threat actor27.2.12 lab   interpret http and dns data to isolate threat actor
27.2.12 lab interpret http and dns data to isolate threat actorFreddy Buenaño
 
APIs: the Glue of Cloud Computing
APIs: the Glue of Cloud ComputingAPIs: the Glue of Cloud Computing
APIs: the Glue of Cloud Computing3scale
 
DataLive conference in Geneva 2018 - Bringing AI to the Data
DataLive conference in Geneva 2018 - Bringing AI to the DataDataLive conference in Geneva 2018 - Bringing AI to the Data
DataLive conference in Geneva 2018 - Bringing AI to the DataSasha Lazarevic
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCAST
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture OverviewDavid Solivan
 
Managing Network Performance Within and Beyond Your Enterprise
Managing Network Performance Within and Beyond Your EnterpriseManaging Network Performance Within and Beyond Your Enterprise
Managing Network Performance Within and Beyond Your EnterpriseThousandEyes
 
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUVærdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUInfinIT - Innovationsnetværket for it
 
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...mfrancis
 
Emerging Fields of Application for RMI: Search Engines and Users
Emerging Fields of Application for RMI: Search Engines and UsersEmerging Fields of Application for RMI: Search Engines and Users
Emerging Fields of Application for RMI: Search Engines and UsersMike Linksvayer
 
IBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo ReynoldsIBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo ReynoldsRoo Reynolds
 
FOWA Miami: How to Build Web Apps for the Emerging Enterprise Market
FOWA Miami: How to Build Web Apps for the Emerging Enterprise MarketFOWA Miami: How to Build Web Apps for the Emerging Enterprise Market
FOWA Miami: How to Build Web Apps for the Emerging Enterprise MarketJenny Ambrozek
 
Big Data: Beyond the "Bigness" and the Technology (webcast)
Big Data: Beyond the "Bigness" and the Technology (webcast)Big Data: Beyond the "Bigness" and the Technology (webcast)
Big Data: Beyond the "Bigness" and the Technology (webcast)Apigee | Google Cloud
 
The Affiliate 2 0 Litmus Test
The Affiliate 2 0 Litmus TestThe Affiliate 2 0 Litmus Test
The Affiliate 2 0 Litmus TestAffiliate Summit
 

Similaire à Don't scan, just ask (20)

Making Web Analytics actionable with Web Content Management
Making Web Analytics actionable with Web Content ManagementMaking Web Analytics actionable with Web Content Management
Making Web Analytics actionable with Web Content Management
 
SHODAN- Defcon 18-schearer-shodan
SHODAN- Defcon 18-schearer-shodanSHODAN- Defcon 18-schearer-shodan
SHODAN- Defcon 18-schearer-shodan
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
Co|Create Website Documentation Guidebook
Co|Create Website Documentation GuidebookCo|Create Website Documentation Guidebook
Co|Create Website Documentation Guidebook
 
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
 
Jeremy cabral search marketing summit - scraping data-driven content (1)
Jeremy cabral   search marketing summit - scraping data-driven content (1)Jeremy cabral   search marketing summit - scraping data-driven content (1)
Jeremy cabral search marketing summit - scraping data-driven content (1)
 
27.2.12 lab interpret http and dns data to isolate threat actor
27.2.12 lab   interpret http and dns data to isolate threat actor27.2.12 lab   interpret http and dns data to isolate threat actor
27.2.12 lab interpret http and dns data to isolate threat actor
 
APIs: the Glue of Cloud Computing
APIs: the Glue of Cloud ComputingAPIs: the Glue of Cloud Computing
APIs: the Glue of Cloud Computing
 
DataLive conference in Geneva 2018 - Bringing AI to the Data
DataLive conference in Geneva 2018 - Bringing AI to the DataDataLive conference in Geneva 2018 - Bringing AI to the Data
DataLive conference in Geneva 2018 - Bringing AI to the Data
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST Highlight
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture Overview
 
Managing Network Performance Within and Beyond Your Enterprise
Managing Network Performance Within and Beyond Your EnterpriseManaging Network Performance Within and Beyond Your Enterprise
Managing Network Performance Within and Beyond Your Enterprise
 
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAUVærdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
Værdikæder i netværk og plug'n play supply chains af John Johansen, CIP på AAU
 
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
 
Emerging Fields of Application for RMI: Search Engines and Users
Emerging Fields of Application for RMI: Search Engines and UsersEmerging Fields of Application for RMI: Search Engines and Users
Emerging Fields of Application for RMI: Search Engines and Users
 
IBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo ReynoldsIBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo Reynolds
 
FOWA Miami: How to Build Web Apps for the Emerging Enterprise Market
FOWA Miami: How to Build Web Apps for the Emerging Enterprise MarketFOWA Miami: How to Build Web Apps for the Emerging Enterprise Market
FOWA Miami: How to Build Web Apps for the Emerging Enterprise Market
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Big Data: Beyond the "Bigness" and the Technology (webcast)
Big Data: Beyond the "Bigness" and the Technology (webcast)Big Data: Beyond the "Bigness" and the Technology (webcast)
Big Data: Beyond the "Bigness" and the Technology (webcast)
 
The Affiliate 2 0 Litmus Test
The Affiliate 2 0 Litmus TestThe Affiliate 2 0 Litmus Test
The Affiliate 2 0 Litmus Test
 

Dernier

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Dernier (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Don't scan, just ask

  • 1. Don‘t scan, just ask A new approach of identifying vulnerable web applications Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 2. Summary It’s about identifying web applications and systems… Classical network reconnaissance techniques mostly rely on technical facts, like net blocks or URLs. They don’t take the business connections into view and hence don’t identify all potential targets. Therefore ‘Spider-Pig’ was developed. A tool that searches for web applications connected to a company based on a scored keyword list and a crawler. That way web application run by satellite companies or service providers can be identified as well. TABLE OF CONTENTS  Overview on classical network reconnaissance  Restrictions and possible enhancements  Presentation of ‘Spider-Pig’ and its approach  Statistics of a real-life scenario  Conclusion Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 3. Classical network reconnaissance TECHNIQUES  Query NIC and RIPE databases  Reverse DNS  DNS Zone Transfer  Research in forums, social networks, …  Google hacking  Identify routing and hence new systems  Brute-Force DNS … TOOLS  whois, dig, web browser, Maltego, … Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 4. How Business looks like… Company A.0 THE TARGET :) SATELLITE COMPANIES  Branch office  Partner firm Company A.1 SERVICE PROVIDER Company B  Payment Provider  Separate Webhoster  Marketing Campaign  Service Center … Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 5. …what we see with network reconnaissance Company A.0 ALL (?)  Net blocks  IP addresses  URLs  DNS information SOME (!)  Net blocks  IP addresses  URLs  DNS information Company A.1 Company B Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 6. Restrictions and possible enhancements Restrictions Enhancements Scans solely on a technical level: For an attacker it doesn’t count whether he - IPs attacks company A or B: - Net blocks - Access to sensitive data - URLs - Reputational damage -… No business relations are taken into account. Take business relationships into account. Potentially incomplete view: You can only search for what you know Build a logical network between systems, (e.g. RIPE queries). independent of the owner. Probably just one company in focus. Identify (all) applications / systems linked to a company based on a business connection level, independent of provider. Not all targets are identified! Development of ‘Spider-Pig’. Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 7. Approach of Spider-Pig Spider-Pig identifies web applications connected to a company in an automated manner and hence allows to identify potential targets (web applications and systems) for further attacks. Due to German laws the tool will not be released to public. But its methodology will be explained… 1. Model Business 2. Perform Search 3. Calculate Results 4. Exploit Model the business, Based on the Duplicates are Targets are sent to a services and keywords, different removed from the custom vulnerability relationships of the search engines a results. For each scanner that uses the company in scope. queried in an domain a score is data from the crawling automated manner. calculated and a sorted phase and attacks the Based on a scored list with the results is web sites in an keyword list with Furthermore ‘whois generated. automated manner. terms, like company information’ are name, product names, gathered for the Top results are At the end, we tax numbers. identified domains and reviewed manually and hopefully get a shell! :) IP addresses. potential targets are Note: No technical extracted. details (e.g. IPs) have Identified web sites are to be provided. crawled for links to new web pages. Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 8. First step: Model Business Idea  Web applications connected to a company contain terms like company name, products or imprint.  There are imprecise terms like products names that lead to many web sites (e.g. Amazon).  There are precise and very specific terms like tax numbers or imprints that lead to company pages. Solution  Manually assemble a list that contains terms specific to the company in focus.  Assign each entry a score, how unique and specific it is. Note: Experience showed that ~200 terms are sufficient and already lead to hundreds thousands of results. Technical details (e.g. URLs or software used) can be used but don’t have to. A score from 1-100 works pretty well, but can be adopted. Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 9. Second step: Perform Search Idea  Keywords are used to query different search engines (e.g. Google, Bing, Yahoo).  Results are read and a list is built, where the fully qualified domain name (FQDN) is the index.  Every time the FQDN is part of a search result, the score assigned to this search item is added.  For the IP and domain name a ‘whois query’ is executed to get details on the owner.  If the whois record contains the company name, address or a keyword, the FQDN is as hit. 1. Take 2. Query keyword search from list engines Example: If you focus on a certain market (e.g. Europe) you can exclude all other results based on the ‘CountryCode’ received via whois. 3. Check 5. results Additional and calc. steps score Note: Using the FQDN as identifier, 4. Perform whois already removes duplicates and query speeds up the process. FQDN IP URL Title Score Hit www.a.com 1.2.3.4 http://www.a.com/about Company A 10 N (9 + 1) http://www.a.com/product1 View product1 Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 10. Second step: Perform Search Implementation Notes  Search component was developed in Perl and is not more than 503 LOC :)  Google and Bing are used as search engines.  Results are stored in memory and wrote to disk in regular intervals. Querying NIC and RIPE databases Depending on the database, the results do have different layouts. Consider this when parsing the ‘whois queries’. If you query too fast, you’re getting blocked. Hence you have to rotate the queried systems or throttle the querying speed. As the search results can easily consist of multiple thousands of systems, consider that a small delay per query will delay the whole process by days. Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 11. Second step: Perform Search Using search engines For Perl there are many modules for different search engines. However most of them don’t work. But ‘curl’ and some regular expressions are fine to implement it yourself. Google covers pretty much, however Bing leads to some additional results. Google Bing  Google Custom Search API can be used  Bing API is available  1.000 queries / day are free  An AppID is needed that can be requested  If you want to use the service efficient, you for free at Bing Developer Center need to buy a search key, which is charged on  Service is free of charge, however the queries the amount of search queries have to be throttled  For a ‘normal’ search this should result in ~200$  Consider different markets (!) as they will lead  Consider different languages (!) as they will to diverse results and disable filter (!) lead to diverse results and disable filter (!) Google: https://www.googleapis.com/customsearch/v1?q=[qry]&num=10&start=[pointer]&lr=[lang]&key=[...]&cx=[cx]&filter=0 Bing: http://api.search.live.net/xml.aspx?Appid=[appid]&query=[qry]&sources=web&adult=off&market=[market]&web.count=5 0&web.offset=[pointer] Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 12. Second step: Crawl Idea  Search queries lead to a scored list of potential targets.  The higher the score, the more probable the web page is connected to the company in focus.  Company web pages probably link to new company web pages.  Web pages with a high score (e.g. 200) should be crawled and checked for external links. Crawling top scored web pages Select certain systems from the list (see third step) and feed them to a crawler. The crawler then identifies new external links on these web pages and hence receives new web applications that might be of interest. These can be appended to the results list. Furthermore the crawler can already perform the first step of the vulnerability scan. Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 13. Second step: Crawl Credits The vulnerability management framework (pita) mentioned during the talk hasn’t been developed by me. It is the effort of multiple years of development by various security consultants working at diverse companies and as freelancer! For ‘Spider –Pig’ just some modifications were made to base components. Crawler  Written in Perl  Identifies external links and adds them to the results list  Performs first step of VA Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 14. Third step: Calculate Results Idea  Now a scored list with all identified targets is available.  If no filter is applied, the list contains hundreds thousands of results and cannot be checked manually.  Results with a low score (e.g. <10) are probably not relevant.  Results with a very high score are probably irrelevant, as they refer to Online Shops, Portals, etc.  Hence just a small portion of the results has to be analyzed manually. Score Interesting Results Web page Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 15. Fourth step: Exploit Idea  Now real targets have been identified that somehow are connected to the company in focus.  Information regarding the content, forms, etc. have been saved in the database during the crawling.  This basis can be used for an automated vulnerability scan. pita Note (again): The vulnerability management framework (pita) mentioned during the talk hasn’t been developed by me. It is the effort of multiple years of development by various security consultants. Based on the identified web applications and the data collected during the crawling (e.g. forms that can be submitted), the vulnerability management framework ‘pita’ is started. ‘pita’ runs:  Fuzzer (XSS, SQL Injection, …)  Web Application Fingerprinter (wafp)  Cookie/Session analyzer  SSL tests  3rd party tools (sqlmap, nmap, Nikto, …) At the end we get a report with all vulnerabilities, out of keywords…  Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 16. Statistics In case we would run ‘Spider-Pig’ against a big known company, we might get the following results: Keywords used 287 Duration (including VA) 7 days – it could be optimized :) Costs ~200 Dollar - due to Google, without Google 0 Dollar Unique FQDNs 150.871 FQDNs with filter 50.784 – after a filter for EU countries was applied Applications reviewed 300 Confirmed applications 223  Marketing campaigns, customer service, official web pages, …  Applications were hosted on external and internal systems  Official web pages within top 10! It works! :) Vulnerabilities  Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 17. Conclusion Classical network reconnaissance doesn’t take all aspects into account and hence does not identify all potential targets of a company in focus. Development of ‘Spider-Pig’, a tool to model business connections.  ‘Spider-Pig’ allows to identify web applications linked to a company due to their business connections.  Based on a list of keywords – without any technical details – ‘Spider-Pig’ attacks companies.  Besides assembling a list of keywords and a manual review of results, no human interaction is needed.  ‘Spider-Pig’ collects some interesting statistics/information and offers new perspectives. Companies should not only focus on protecting their own systems.  An attacker will (most likely) take the easiest way.  Companies should not only protect their own systems but choose service providers with caution.  Sensitive information should not be spread across multiple systems and business partners. Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin
  • 18. Thanks! Questions? Contact me ‘fmihailowitsch [at] deloitte.de’ Credits Richard Sammet, who developed the idea & tool with me! Fabian Mihailowitsch 28th Chaos Communication Congress, 12/28/11 - Berlin