Information Gathering. Before an attack What information do we need? WHOIS details OS & web server details (NetCraft, whois.webhosting.info) DNS information,

Slides:



Advertisements
Similar presentations
Ethical Hacking Module IV Enumeration.
Advertisements

Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
Faith Allington Program Manager Microsoft Corporation WSV322.
Building International Applications with Visual Studio.NET Achim Ruopp International Program Manager Microsoft Corporation.
Web Server Sun Peng What is server - Question  First thing first! We need a definition: What is a server? ?
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Revealing the Secrets: Source Code Disclosure, Techniques, and Impacts.
Computer Security Fundamentals
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Web Security Model CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
Introduction to Web Base Multimedia Application. Web base application TCP/IP (HTTP) protocol Using WWW technology & software Distributed environment.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Introduction to Web Based Application. Web-based application TCP/IP (HTTP) protocol Using WWW technology & software Distributed environment.
1 CS6320 – Why Servlets? L. Grewe 2 What is a Servlet? Servlets are Java programs that can be run dynamically from a Web Server Servlets are Java programs.
Definitions, Definitions, Definitions Lead to Understanding.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
1 Enabling Secure Internet Access with ISA Server.
Tomcat Celsina Bignoli History of Tomcat Tomcat is the result of the integration of two groups of developers. – JServ, an open source.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Port Scanning.
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
DAT602 Database Application Development Lecture 15 Java Server Pages Part 1.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
A Back-Stage Pass: What Every Hacker Wants Presented by: Art Jones.
Introduction to ASP.NET. Prehistory of ASP.NET Original Internet – text based WWW – static graphical content  HTML (client-side) Need for interactive.
1 Web Server Concepts Dr. Awad Khalil Computer Science Department AUC.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Basics of Web Databases With the advent of Web database technology, Web pages are no longer static, but dynamic with connection to a back-end database.
Nic Shulver, Intro: Developing Server Applications What is a server? Many types of server – File server – file: networked file.
Session 10 Windows Platform Eng. Dina Alkhoudari.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
Web Application Programming Carol Wolf Computer Science.
Copyright (c) 2010, Dr. Kuanchin Chen1 The Client-Server Architecture of the WWW Dr. Kuanchin Chen.
Chapter 17 - Deploying Java Applications on the Web1 Chapter 17 Deploying Java Applications on the Web.
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 21 - Web Servers (IIS, PWS and Apache) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
CIS 450 – Network Security Chapter 3 – Information Gathering.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Scott Marino MSMIS Summer Session Web Site Design and Authoring Session 1 Scott Marino.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
How to configure DNS for a Windows 2000 domain? 1.Start the Install/Remove Programs Control Panel Applet (Start - Settings - Control Panel - Add/Remove.
Presentation: SOAP/WS in a distributed object framework, Application Servers & AXIS SOAP.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
1 Session 1: Introduction to PHP & MySQL iNET Academy Open Source Web Development.
Enterprise PHP - Introduction Enterprise Client-Server Development with PHP Nic Shulver, FCES, Staffordshire University A fifteen credit module based on.
ASP (Active Server Pages) by Bülent & Resul. Presentation Outline Introduction What is an ASP file? How does ASP work? What can ASP do? Differences Between.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Footprinting and Scanning
Hands-On Ethical Hacking and Network Defense
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
Glink for Java: applet, application and an API for integrating access to Bull, IBM, UNIX and Minitel systems with your Java based e-business applications.
4000 Imaje 4020 – Software Imaje 4020 – Content ■ Content of Chapter Software: 1. Flash Up 2. Netcenter 3. FTP 4. Active X 5. XCL commands 6. Exercise.
A S P. Outline  The introduction of ASP  Why we choose ASP  How ASP works  Basic syntax rule of ASP  ASP’S object model  Limitations of ASP  Summary.
Chapter 1 Getting Started with ASP.NET Objectives Why ASP? To get familiar with our IDE (Integrated Development Environment ), Visual Studio. Understand.
ArcGIS for Server Security: Advanced
Distributed Control and Measurement via the Internet
Footprinting and Scanning
CITA 352 Chapter 5 Port Scanning.
Footprinting and Scanning
Web App vs Mobile App.
Passive Research Section 2 11/29/2018.
Presentation transcript:

Information Gathering

Before an attack What information do we need? WHOIS details OS & web server details (NetCraft, whois.webhosting.info) DNS information, Zone transfers, reverse DNS lookups Open ports?

Information Gathering Legal issues Is gathering information on a target legal? Yes BUT, port scans are considered to be an attacks so check local laws for further information Other information gathering techniques are, for the most part, legal but please check before you proceed

Information Gathering WHOIS What information to look for: Owner Administrative contact Technical contact

Information Gathering OS & web server details

Information Gathering DNS information What information to look for: Find the DNS server details Now what? C:\>nslookup > server > set type=any // return all records > ls –d

Information Gathering DNS information (cont.) Reverse DNS lookup Ping –a (we can also use nmap as described in the next section)

Information Gathering Open ports? We have to install a few things WinPcap 3.1: Installer for Windows 95/98/ME/NT4/2000/XP/2003/Vista NMAP: Latest stable Nmap command-line zipfile: nmap-3.93-win32.zip

Information Gathering Open ports (cont)? Performing a quick and simple port scan SYN scan: nmap –sS –P0 –p- (C:SYN; S:SYN/ACK; C:RST) CONNECT scan: nmap –sT –P0 –p- (three way handshake: C:SYN; S:SYN/ACK; C:ACK; C S; S C) SRC port: nmap –sS –P0 –p- -g53 Ping sweep: nmap –sP Reverse DNS: nmap –sP –R

Information Gathering Try it on a site you use Lets try one together Gather WHOIS details OS & web server details (NetCraft) DNS information, Zone transfers, reverse DNS lookups (

Web applications

What are web applications? msdn.microsoft.com Any application that uses the HTTP protocol to communicate with its clients

Web applications What are web applications? (cont.) REQUEST: GET /html/default.asp HTTP/1.1 Host: Connection: close Accept-Encoding: gzip RESPONSE: HTTP/ OK Connection: close Content-Type:text/html Content-Encoding:gzip

Web applications What are web applications? (cont.) Lets have a look at the raw data on the wire…

Web platforms

What technologies exist? JAVA (i.e. Servlets, JSP) ASP.NET (C#, J#, ASP, C++) PHP Lotus Notes Cold Fusion Native Code (i.e. ISAPI) CGI (i.e. Perl, C) BEA WebLogic IBM WebSphere Zope (i.e. Python)

Web platforms What is the difference? Programming language Performance Features Integration Stability Administration Ease of use Security What else?

Web platforms ASP Have tendency to be vulnerable, no/limited built-in facilities

Web platforms PHP Global variables can be problematic

Web platforms Lotus Notes ACLs on NSF files are often poorly configured

Web platforms CGI Native code = native code issues (b0f)

Web platforms Java and.NET security Source files can be decompiled and read Any secrets are exposed Connection string information User credentials Internal addresses What tools exist to help us? Java: DJ Decompiler ( Salamander (

Web platforms Native code versus web technologies Whats the difference between them with respect to getting the source? Native code = ASM VM code = byte code Reversing native code The original source code is not available Programme flow is harder to follow (IDA Pro can help) Reversing VM code The original code is readable DJ turns *.class, *.jar files into Java code Salamander: exes or dlls into VB or C#.NET

Web platforms Reversing demo Native code Java.NET

Web platforms Protection Dongles VM code: Obfuscation techniques Salamander HASP Native code: packers Exe Shield Armadillo ASProtect Anticrack

Web platforms Summary You dont have to break the law to gather info. Although port scanning in illegal Platforms, some better than others/more security aware

?