Presentation is loading. Please wait.

Presentation is loading. Please wait.

Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

Similar presentations


Presentation on theme: "Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009."— Presentation transcript:

1 Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009

2 2 Main Objectives Insecurities Impact Attack Techniques

3 3 A little about me...

4 4 What this talk will cover Intro DHCP Script Injection Attack SSID Script Injection Attack Scanning for Webmin Servers Attack Recommendations, Summary & QA

5 5 Introduction

6 6 Administrative Web Interfaces Administer Systems and Networks Help Administrators Most Network Systems have One

7 7 Why should they be secured? Vulnerable as any other Web Application Highly Privileged Access Different Services, Systems and Protocols Used in “Trusted Environment”

8 8 Today’s Web Application Attacks User Input Validation Security Best Practice Out of Band Channels

9 9 DHCP Script Injection Attack

10 10 DHCP “HandShake”

11 11 DHCP Request Packet

12 12 DHCP Script Injection Attack Active DHCP Leases List Attacker located in same LAN To Be Vulnerable

13 13 DHCP Script Injection Attack

14 14 DHCP Script Injection Attack

15 15 DHCP Script Injection Attack

16 16 DHCP Script Injection Attack

17 17 DHCP Script Injection Attack - DEMO pfSense Tool Remote Command Execution

18 18 SSID Script Injection Attack

19 19 SSID Script Injection Attack 802.11 Protocol Management Beacon Frames Malicious Code in SSID

20 20 SSID Script Injection Attack “Scan for Neighbours AP” Functionality Attacker located in Wireless Range Max. SSID length = 32 Characters SSID1/** **/SSID2 = 64 Characters Access to Internet Attacker Server

21 21 SSID Script Injection

22 22 SSID Script Injection

23 23 SSID Script Injection

24 24 SSID Script Injection

25 25 SSID Attack - DEMO Linksys – DD-WRT firmware Tool Disable Wireless Encryption

26 26 Scanning for Webmin Servers Attack

27 27 Webmin

28 28 Scanning for Webmin Servers

29 29 Scanning for Webmin Servers Attack Attacker located in same Network Redirect user to fake Webmin Server Obtain Administrator Credentials CSRF

30 30 Scanning for Webmin Servers Attack

31 31 Scanning for Webmin Servers Attack

32 32 Scanning for Webmin Servers Attack

33 33 Demo

34 34 Webmin Web Based Attack Propagation

35 35 Webmin Web Based Attack Propagation

36 36 Webmin Web Based Attack Propagation

37 37 Webmin Web Based Attack Propagation

38 38 Webmin Web Based Attack Propagation

39 39 Webmin Web Based Attack Propagation

40 40 Webmin Web Based Attack Propagation

41 41 Webmin Web Based Attack Propagation

42 42 Webmin Web Based Attack Propagation

43 43 Webmin Web Based Attack Propagation

44 44 Webmin Web Based Attack Propagation

45 45 Webmin Web Based Attack Propagation

46 46 Webmin Web Based Attack Propagation

47 47 Webmin Web Based Attack Propagation

48 48 Webmin Web Based Attack Propagation

49 49 Webmin Web Based Attack Propagation

50 50 Webmin Web Based Attack Propagation

51 51 Recommendations

52 52 Recommendations

53 53 Recommendations Assess Deployment Do not Trust your Internal Network Penetration Testing Strict Security Policy Risk Management

54 54 Summary Vulnerable as any other Web Application Additional Attack Vectors “Scanning”, “Detecting “,“Finding” Functionality Risks Increased Used in “Trusted Environment”

55 55 References & Further Reading Project Web Site: http://labs.mwrinfosecurity.com/ Contact Me rafael.dominguez-vega( )mwrinfosecurity!com

56 56


Download ppt "Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009."

Similar presentations


Ads by Google