Hacking Primer: Martin G. Nystrom, CISSP-ISSAP Security Architect, Cisco Systems, Inc
Hacking Primer: Martin G. Nystrom, CISSP-ISSAP Security Architect, Cisco Systems, Inc
Session Number
Presentation_ID © 2003 Cisco Systems, Inc. All rights reserved. 1
Outline
• Internet footprinting
• Hacking Windows
• Hacking Unix/Linux
• Hacking the network
Presentation_ID
mnystrom © 2004
2003 Cisco Systems, Inc. All rights reserved. 3
Internet Footprinting Outline
Presentation_ID
mnystrom © 2004
2003 Cisco Systems, Inc. All rights reserved. 8
Hacking Windows outline
1. Scan
2. Enumerate
3. Penetrate
4. Escalate
5. Pillage
6. Get interactive
7. Expand influence
• 3 methods
Guess password
Obtain hashes
Emergency Repair Disk
Exploit a vulnerable service
• Guessing passwords
Review vulnerable accounts via dumpsec
Use NetBIOS Auditing Tool to guess passwords
• getadmin
getad
getad2
pipeupadmin
• Shatter
Yields system-level privileges
Works against Windows Server 2003
• Clear logs
Some IDS’s will restart auditing once it’s been disabled
• Grab hashes
Remotely with pwdump3
Backup SAM: c:\winnt\repair\sam._
• Grab passwords
Sniff SMB traffic
• Crack passwords
L0phtcrack
John the Ripper
• Get passwords
Keystroke logger with stealth mail
FakeGINA intercepts Winlogon
• Plant stuff in registry to run on reboot
• Hide files
“attrib +h <directory>”
Stream files
Tripwire should catch this stuff
Presentation_ID
mnystrom © 2004
2003 Cisco Systems, Inc. All rights reserved. 19
Hacking Unix/Linux outline
1. Discover landscape
2. Enumerate systems
3. Attack
– Remote
– Local
• Goals
Discover available hosts
Find all running services
• Methodology
ICMP and TCP ping scans
Find listening services with nmap and udp_scan
Discover paths with ICMP, UDP, TCP
• Tools
nmap
SuperScan (Windows)
udp_scan (more reliable than nmap for udp scanning)
• Users
finger
SMTP vrfy
• DNS info
dig
• RPC services
rpcinfo
• NFS shares
showmount
• Countermeasures
Turn off un-necessary services
Block IP addresses with router ACLs or TCP wrappers
• Back channels
X-Windows
Send display back to attacker’s IP
Reverse telnet
• Buffer overflow
• Setuid programs
• Password
guessing/cracking
• Mis-configured file/dir
permissions
• Vulnerabilities
• Dealing with firewalls
Presentation_ID
mnystrom © 2004
2003 Cisco Systems, Inc. All rights reserved. 29
Vulnerabilities
• Path integrity
Source routing reveals path through the network
Routing updates can be spoofed (RIP, IGRP)
• ARP spoofing
Easy with dsniff