Introduction to Information Security Network Traversal nirkrako at post.tau.ac.il itamargi at post.tau.ac.il.

Slides:



Advertisements
Similar presentations
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Advertisements

Password Cracking Lesson 10. Why crack passwords?
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
Introduction to Information Security Network Traversal nirkrako at post.tau.ac.il itamargi at post.tau.ac.il.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Cryptography and Network Security Chapter 20 Intruders
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Samba Integrating SMB file systems with UNIX. Samba Provides a file server compatible with Windows 9x and NT.. SMB Can function in NETBIOS name browsing.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Georgy Melamed Eran Stiller
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Exposing the Secrets of Windows Credential Provider Presented By: Subrat Sarkar Give me your password.
A Comparison of the Security of Windows NT and UNIX Hans Hedbom, Stefan Lindskog, Stefan Axelsson and Erland Jonsson Originally presented at the Third.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Forensic Artifacts From A Pass The Hash (PtH) Attack
WARNING! Sample chapter -Materials in this sample chapter is selected advanced penetration from
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Introduction to VPN for MVS. Presented by Kevin D. Burney Computer Systems and Network Architect Office of the Vice Chancellor of Budget and Finance.
The Truth About Protecting Passwords COEN 150: Intro to Information Security Mary Le Carol Reiley.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
CIS 450 – Network Security Chapter 8 – Password Security.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
System Hacking Active System Intrusion. Aspects of System Hacking System password guessing Password cracking Key loggers Eavesdropping Sniffers Man in.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
CHAPTER 9 Sniffing.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Cracking Techniques Onno W. Purbo
Chapter 10: Rights, User, and Group Administration.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
Password cracking Patrick Sparrow, Matt Prestifillipo, Bill Kazmierski.
SCSC 455 Computer Security Chapter 3 User Security.
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Penetration Testing Exploiting I: Password Cracking
Hacking Windows.
I have edited and added material.
Secure Software Confidentiality Integrity Data Security Authentication
Password Cracking Lesson 10.
Outline Introduction Characteristics of intrusion detection systems
Darren Mar-Elia Head of Product
Common Operating System Exploits
Lesson 16-Windows NT Security Issues
SECURITY IN THE LINUX OPERATING SYSTEM
Lecture 2 - SQL Injection
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Linux Security.
Intrusion.
Crisis and Aftermath Morris worm.
Test 3 review FTP & Cybersecurity
Pass-the-Hash.
Presentation transcript:

Introduction to Information Security Network Traversal nirkrako at post.tau.ac.il itamargi at post.tau.ac.il

Network Traversal - Introduction We now move from discussing the act of hacking a single machine or device, to discuss the act of traversing through an entire network: o How organized networks are structured. o How hackers penetrate organized networks, usually administered by a single person, or team of administrators. o How hackers traverse the network to gain access to more resources and data.

Victim Network Ve rti ca l Horizontal/Lateral

Patient 0 A hackers will try to infect one computer, by different methods: o Chance / statistical Luck! o Spear-phishing or human error. o Social engineering o Pure hacking. After infecting patient 0. Hackers can attempt to launch different types of attacks which can now depend on the internal network structure and support mechanisms. By using what information and access readily available on the hacked machine, hackers can attempt to laterally traverse the netwok.

Spearphishing “Spear phishing is an spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.” -- ar-phishing ar-phishing

An I received True story: I received this a few days ago. Can you spot the fail?

Network Users In an organized network, each user is given a single user/password credential, this password is used to authenticate the user against all machines in the network which the user should have access to. Example: TAU. Your user and password is used to login to the *n?x machines as well as the video website. If a computer used by one of the users is compromised. you can use his credentials if gained to login to all machines in the network.

Sniffing for passwords By local example.bashrc << __EOF__ alias ‘sudo’ ‘/tmp/sudo.sh’ __EOF__ /tmp/sudo.sh << __EOF__ #!/bin/bash echo “Enter password:” read PASS echo $PASS > /tmp/.password.log sudo $1 $2 $3 $4 $5 $6 __EOF__

Sniffing for passwords On windows and other GUI based applications: key logging is used to record credentials being entered. By actually sniffing the network, looking for “telnet” or other unencrypted communication ways – communication where passwords are given in clear text format. Sniffing the network traffic looking for hashes which can later be cracked (More in next slide).

Cracking passwords Gaining root access to /etc/shadow (previously /etc/passwd) leads to obtaining password hashes John the Ripper or other password brute forcing techniques can then be used to retrieve the clear text password. The clear text password can be used to login to other computers. Users tend to use the same password for all computers and services, making it easy to gain access to other resources.

rlogin/rsh - history Instead of logging in all the time – rlogin/rsh is used to authenticate a user without the need to enter a password. Once a connection is received from a trusted machine and it declares that the user remotely connecting is the user, the user automatically gains remote machine access with the same credentials. Many hacking techniques employ: o echo “+ +” > ~root/.rhosts o This lets anybody from any host connect to the computer. IP spoofing can be used to gain remote access as well. And this poor authentication is still being used in some dark corners of the world. NFS V < 4 has also utilizes the same bad authentication by only comparing host/port(using identd) to identify the user.

Domain of computers

Unix NIS (Network Information Service) The NIS (formerly known as Yellow Pages/YP) protocol is and old protocol used to sync passwords across a network. The NIS passwords are used to spread credential of a network of computers. From each of the servers in the network access is given to a virtual directory which contains files such as “passwd”/ “shadow”, etc. By using shell: # ypcat passwd o You can get the network hashes of ALL users! o In a secure network scheme this does not include the root account, however local account access can be gained on all computers sharing the passwd file.

Pass the hash Passing the hash is an original way of authentication for SSO (Single Sign On) which is easily exploitable. In windows based systems, by simply passing the hash, a user is able to proove that he has the credentials needed to gain access to a resource (such as a network share). Once hackers log in to a system, they can use locally existing network hashes to pass them to other systems by this process: o Gain local administrator privileges o View locally logged in accounts. o Impersonate a user locally. o Use regular windows operations to access network resources. o Gain more access and run remote code using psexec (sysinternals utility).

LSASS Slide was taking from “WCE Internals by Amplia Security”

Hash harvesting On windows computers, hashes are saved localy even after a logon session is terminated in case access to the domain is no longer available. Several tools are in the wild used to do this hash harvesting, such as: o WCE – Windows Credential Editor o Pass The Hash Toolkit. o gsecdump o Maybe more. o pwdump - hash dumping is also possible localy by dumping the SAM file (Security Accounts Manager) WCE and its like: o User ProcessReadMemory() to read the memory of LSASS for harvesting o Inject code to implement the impersonation of users. Side Note – cracking NTLM hashes: o NTLM aka NT LanMan (Lan Manager) hashes are DES based hashes of max 14 byte passwords: Each 7 bytes of the password is hashed seperately making it easier instead of 256^14 we get 256^7 * 2. Therefore a rainbow table can be easily created.

Unix NFS (Network File System) The Unix NFS comparable to windows “Sharing”. Is a method of sharing directories by allowing other to locally mount a remote directory as if it was their own. As we previously learned using u+s and o+x to a file that hands us root privileges we are able to escalate our privileges: o echo "main(){setuid(0);setgid(0);system("/bin/sh");}" > a.c o gcc –o a a.c Misconfigured NFS, allows mounted directory to contain suid files, therefore allowing root on one machine the ability to gain o

Shared binaries patching Administrators or users share binaries on network shares / NFS. (Usually installation files). If those network shares are writable by a hacker he can modify them and then wait for other users to execute them. Example at TAU: mount | grep '/ type' netapp1:/vol/vol0/linux-root/precise/common/ on / type nfs (rw,relatime,vers=3,rsize=65536,wsize=65536,namlen=255,hard,nolock,proto=tcp,port=65535,timeo=70,retrans =3,sec=sys,local_lock=all,addr= )

Questions?