Given by Roman Markowski at Tango Group Internal Technology Seminars on April 23 99. Foils prepared May 19 99
Outside Index
Summary of Material
Examples and Typical attack weopens |
Denial of Service, DNS Cache Poisoning, Port Scanners, Back Orifice |
Web and Java |
UNIX is better than NT |
Outside Index Summary of Material
Roman Markowski |
IS Manager |
Northeast Parallel Architectures Center |
Syracuse University |
April 23 1999 |
http://www.npac.syr.edu/users/roman/ |
Computer crimes
|
Attacks
|
Attacks
|
Attacks
|
There is no such thing as a 100% secure computer network |
Only 5% of crackers write their own code; most cracker tools is publicly available |
Large majority of attacks are INTERNAL ( altering data; stealing source code; damaging computer systems; revealing confidential information) |
gain access to an account
|
use "crack" to break more user passwords |
obtain superuser privileges |
install "back doors" (Trojan Horses) |
install sniffers (packet and password grabbers) to obtain more password and site information |
Strobe - excellent port scanner http://rootshell.connectnet.com/ |
Mscan - powerful scanner http://rootshell.connectnet.com/ |
Scotty - protocol agent http://wwwsnmp.cs.utwente.nl/~schoenw/scotty/ |
Jizz - DNS poison server http://rootshell.connectnet.com/ |
Nmap - many types of scans http://www.insecure.org/nmap/index.html |
RootKit - OS centric tools http://rootshell.connectnet.com/ |
QueSO - OS identification ftp://apostols.org/AposTools/snapshots/ |
SATAN - exposure assessment ftp://ftp.win.tue.nl/pub/security |
SAINT - based on SATAN http://32bit.bhs.com/ |
IP space, names, mail servers, contact information
|
management, topology and gateway data
|
information about hosts
|
Information about vulnerabilities
|
Attack |
Hacker attacks (vandalism, springboard) |
Denial of service (competition) |
Theft (software, ideas, money) |
Damage to public image (companies, people) |
Cracker tools getting easier to use (GUI) and easily distributed (hacker groups as distribution houses) |
High quality, extremely functional hacker tools; lots of good tools |
Attack from multiple sources simultaneously at Christmas time, New Years Eve, etc |
New hacks all the time |
The attacks are getting more sophisticated |
Various hacks are combined |
Against companies to make their computers unusable; damage the company image |
Takes systems attention from real attack |
There are countless DoS attacks out there today ftp://info.cert.org/pub/tech_tips/denial_of_service |
Various forms:
|
SYN Flood
|
SYN Flood - Defense
|
Land Attack
|
Defense
|
Teardrop Attack (summer 1997 )
|
Defense
|
Smurf Attack
|
Defense
|
Ping of Death
|
DNS - Domain Name Service - critical component of the Internet; maps names to IP addresses; mail exchanger |
Clients use resolver to access DNS servers |
BIND - Berkeley Internet Name Domain - most common DNS |
DNS servers query each other to resolve names (QueryID) |
To lower traffic requirements, DNS servers will cache answers |
Client |
Local |
DNS |
Company |
DNS |
COM |
DNS |
Root |
DNS |
www.company.com |
Evil |
x.y.z.w |
DNS |
good |
DNS |
evil |
DNS |
bank |
(1) any.evil.com ? |
(2) any.evil.com ? |
(3) store Query ID# |
(4) www.bank.com ? |
(5) www.bank.com ? |
(6) spoof answer: |
www.bank.com=x.y.z.w |
(7) Cache: |
www.bank.com |
= x.y.z.w |
Good |
(8) www.bank.com ? |
(9) x.y.z.w |
(10) bank transaction |
Www |
bank |
DNS cache attack affects all versions of BIND and Windows NT Server DNS |
Defense
|
Help to identify openings on a system and the type of the system |
Understand what services are running where |
Direct
|
Indirect
|
Scan all 65,535 TCP ports and 65,535 UDP ports
|
Examples: network scans
|
Examples: port scans
|
MSCAN
|
SCOTTY
|
NMAP - http://www.insecure.org/nmap
|
QueSO - http://www.apostols.org/projectz/queso
|
NMAP - FTP bounce
|
Allows remote control of Win 95 and Win 98 |
Backdoor: allows attacker to bypass system security |
Gives remote access to File system, registry, passwords, operating system, network, processes, screen and keyboard |
Introduced in August 1998 by Cult of the Dead Cow (cDc); Free from http://www.cultdeadcow.com |
BO2K (Back Orifice 2000) on the way! |
Contains integrated services: HTTP server, packet sniffer, keyboard monitor for logging keystrokes, connection and application redirection |
Works in Client - Server model; client and server communicate over UDP port 31337; port can be changed |
Server must be installed on the victim machine; trivial to install; does not show up in the task list |
Client runs on hacker's machine |
Very nice GUI; there is also command line interface |
Capabilities
|
Capabilities
|
Defense
|
NT is not immune
|
Allows an attacker to steal, share, terminate, monitor and log any terminal session that is in progress |
Session stolen across the network |
HUNT, session hijacking tool written in November 1998: http://www.rootshell.com allows insertion of commands or takeover of session |
What can be hijacked: telnet, rlogin, rsh, ftp |
Session hijacking scenario:
|
Other tools: Juggernout, TTYWatcher, IPWatcher |
Defenses: use strong authentication (SSH), do not telnet to critical computers |
It is an attempt by a computer hacker to persuade a legitimate system user to reveal information, allowing the hacker to break through the system security |
most common way hackers break into systems |
the most common attack through the telephone |
" If you give me your logon ID and password, I can fix it in a few minutes, you can change your password when I am done" |
hacker takes advantage of the organization size - people do not know each other |
if you receive a suspicious phone call, ask for a phone number and call the person back. |
URL rewriting |
The attacker creates false "copy" of a the entire Web
|
Defense
|
The attacker inserts a frame into a web page
|
Defense
|
When PHF script exist
|
Most Web applications are never tested for penetration vulnerabilities (input handling issues)
|
Web servers have well-known bugs: in most cases requires ability to find, read and recreate exploits |
various exploits described at |
Most popular: replace web pages with new ones; put additional contents |
Runs under Unix operating system |
My network allows outgoing telnet (src port > 1024, destination port =23) |
Attacker installs a sneaking daemon on our network and sends a few pings from outside. Daemon responses "telneting" out and the session is established |
When connection made, sneakin client and server reverse the connection |
Available from http://www.rootshell.com |
Defense: strong internal host security and Principle Of Least Privileges (open absolutely minimal amount of services) |
Think of it as a telnet over ICMP (ping): gives the ability to tunnel shell sessions over ICMP or UDP port 53 (looks like DNS) |
Offers a command line shell to the attacker on the victim machine |
Works in a client-server model; first server must be installed on the victim's machine |
http://www.phrack.com/Archives/phrack51.tgz |
Defense: know what should be running on your system |
Software that attempts to guess passwords for an account for Unix and NT (directory entries, brute force, User Id variations) |
Requires /etc/passwd (can be stolen using "phf" in cgi-bin) and somebodyelses account |
attacker runs Crack against the stolen `passwd' file on his own computer |
Crack functionality: guess password, encrypt, check if match, try again |
Crack v 5.0 for Unix released in 1996 |
L0phtcrack ver 2.5.2 for Windows NT updated December 1998
|
SNARF
|
Denial of Service applets
|
Defense
|
Stores information on browser client |
Are cookies secure ?
|
Unix since 1969; never intended to be secure; trusted (C2 and up) versions available; better knowledge what is going on; more mature; easier than NT to setup security |
Windows NT - relatively new; many unknown security issues (black box); very unsecure |
Do not even think about it .... |