an effective attack method based on information exposed
play

An Effective Attack Method Based on Information Exposed by Search - PowerPoint PPT Presentation

An Effective Attack Method Based on Information Exposed by Search Engines Antonios Gouglidis, University of Macedonia IT Security for the Next Generation European Cup, Prague 17-19 February, 2012 Motivation Extensive usage of Web 2.0


  1. An Effective Attack Method Based on Information Exposed by Search Engines Antonios Gouglidis, University of Macedonia “IT Security for the Next Generation” European Cup, Prague 17-19 February, 2012

  2. Motivation Extensive usage of Web 2.0 technologies • Mostly interested in WS provided by major search engines How WS can be used in a malicious way? PAGE 2 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  3. Anatomy of an Attack Initial Steps Footprinting Scanning Enumeration Gaining access Determination of reachable Probe identified hosts and running Attempt to access the Objective Information gathering systems services for known weaknesses target system •Open source search •TCP/UDP port scan •Buffer overflows •Identify applications Technique •Whois •OS detection •Password •List file shares •DNS zone transfer •Ping sweep eavesdropping •Search engines •nmap •Banner grabbing •Bind, ISS Tools •UNIX/LINUX clients •fping •showmount •tcpdump •nslookup PAGE 3 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  4. The Proposed Attack Method A 3-step Methodology PAGE 4 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  5. How to Deploy the Attack The attack cannot be identified, until its deployment !!! Vulnerable Systems HTTP Proxy Create a query using advanced search operators Return URLs Create a valid HTTP Post Request Deploy the exploit PAGE 5 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  6. Implementation Prerequisites Register to get an APPID for either Google or Bing The proposed methodology utilizes: • The “Google Hacking” technique • Web 2.0 technologies – REST approach – JSON PAGE 6 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  7. Implementation JBossHacker.py Implemented in the Python scripting language • Approximately 50 lines of code Supported search engines • Google • Microsoft Bing What it can do? • Find servers having their JBoss JMX-Console open • Deploys an exploit • Gain command line access via a Web browser PAGE 7 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  8. Hands-on JBossHacker.py - Results Summary Possible Vulnerable Systems PAGE 8 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  9. Hands-on JBoss Deployment Scanner PAGE 9 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  10. Hands-on Gaining Command Line Access PAGE 10 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  11. How to defend yourself? Existing Solutions Google Hack Yourself Rely on Policy and Legal Restrictions Google Diggity Project • Provides an Intrusion Detection System – Alert RSS Feeds – Alert RSS Monitoring Tools PAGE 11 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  12. Conclusions The Proposed Attack Methodology What it can do? • Targets online Web Applications on the Internet – Not bounded to a single application • Deploy massive attacks, in an automated way • Undetectable until the time of deploying the exploit • High probability of a successful attack, if target satisfies ALL the criteria What it cannot do? • Discover new vulnerabilities – Prior knowledge of the vulnerability/exploit is required • No guarantees of a successful attack, if criterias are not met by the target PAGE 12 | "IT Security for the Next Generation", European Cup | 17-19 February, 2012

  13. Thank You Antonios Gouglidis, University of Macedonia “IT Security for the Next Generation” European Cup, Prague 17-19 February, 2012

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend