attack frameworks and tools
play

Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold - PowerPoint PPT Presentation

Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universitt Mnchen, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet Technologies and Mobile


  1. Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet Technologies and Mobile Communication WS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München

  2. Overview  Introduction  Overview of Tools  Password Crackers  Network Poisoners  Network Security Tools  Denial of Service Tools  Concluding remarks Titel Attack Frameworks and Tools 2

  3. Introduction  Network Security – perhaps the most important aspect of communications in todays world  How easy it is to attack a target system or network today?  Tools automate most of the work  From fingerprinting your target to attacking  Knowledge requirements decrease day by day Titel Attack Frameworks and Tools 3

  4. Introduction  The CIA Triangle Confidentiality Integrity Availability Titel Attack Frameworks and Tools 4

  5. Overview of the Tools  Password Crackers Cain and Abel John the Ripper Hashcat • Free • Free • Free • Windows • Various • Linux, Only GUI Platforms OSX and Windows Titel Attack Frameworks and Tools 5

  6. Overview of the Tools  Network Poisoners ZARP Ettercap • Free • Free • Python • Various Script Platforms Titel Attack Frameworks and Tools 6

  7. Overview of the Tools  Network Security Tools Nmap Metasploit Sqlmap • Free • Free • Free • Various (Signup • Python Required) Platforms Script • Windows and Linux Titel Attack Frameworks and Tools 7

  8. Overview of the Tools  Denial of Service Tools LOIC HULK • Free • Free • Windows • Python Only GUI Script Titel Attack Frameworks and Tools 8

  9. Password Crackers  Attack: Confidentiality  Crack passwords or keys  Crack various kind of hashes  Initially used to crack local system passwords like for Windows and Linux  Have extended to include numerous kinds of hashes  New versions are faster and use different kind of cracking methods  GPU based password cracking also possible and is faster than CPU based  Primarily: Brute forcing or Dictionary based attacks Titel Attack Frameworks and Tools 9

  10. Password Crackers  Cain and Abel  Windows based  Widely used to crack Windows Passwords (LM Hashes and NTLM Hashes)  Has built-in sniffer • Can sniff web session passwords • Can analyse SSH-1 or HTTPS traffic  Needs: • Rainbow tables for effective hash cracking • Size of table – impediment! – However, this is an issue with all password crackers and related to password lengths and reverse hash lookups Titel Attack Frameworks and Tools 10

  11. Password Crackers  John the Ripper  Like Cain and Abel - Dictionary based and Brute force methods available  Comes with various character sets  Can crack numerous kinds of hashes  Brute force can for obvious reasons take a huge amount of time • Dictionaries could go up to petabytes • Cracking time could be in excess of decades for even a 8 character password • Normal machines: Impossible – Solution: Good dictionaries? Titel Attack Frameworks and Tools 11

  12. Password Crackers  Hashcat  Like the previous tools – However claims to be “fastest password cracker” with proprietary cracking algorithms  Vs. Cain and Abel & John the Ripper - Offers various kinds of attacks • 8 kinds of attacks • Example: Combinator attack – combine each word in dictionary to every other word in it • Example: Hybrid attack – Half of password from dictionary and rest from brute force • HENCE, INCREASES EFFECTIVENESS OF A DICTIONARY  A GPU Based cracker – “ oclHashcat ” available - faster Titel Attack Frameworks and Tools 12

  13. Network Poisoners  Attack: Integrity of the Network  Can lead to loss of confidentiality and availability too  Prime goal : ARP Poisoning  Pose as another machine on the Network Titel Attack Frameworks and Tools 13

  14. Network Poisoners  Once done:  Pose as DNS Server  Pose as DHCP Server  Pose as the default gateway  Perform Data Sniffing  Man in the Middle Attacks (MITM)  and a lot more…  Even HTTPS traffic is not safe (tool called SSLStrip) – yet another tool that can be used without much insights. Titel Attack Frameworks and Tools 14

  15. Network Poisoners  ZARP  Suite of Poisoners  Includes Sniffers  Plans to be a central network poisoning/administration tool  Can manage active sessions of poisoning/sniffing  Still being developed Titel Attack Frameworks and Tools 15

  16. Network Poisoners  Ettercap  GUI available too!  Plugins offer support for further complex attacks like: • DNS Poisoning • DHCP Poisoning Titel Attack Frameworks and Tools 16

  17. Network Security Tools  Covers wide array of tools  Most were created for vulnerability testing and easing the job of network administrators  Today are used to test how secure a system is  But are also infamous for their misuse by hackers Titel Attack Frameworks and Tools 17

  18. Network Security Tools  Nmap  Network Scanner  A powerful tool to scan networks  Used for (not exclusive list): • OS fingerprinting • Host Discovery • Port Scanning Titel Attack Frameworks and Tools 18

  19. Network Security Tools  Metasploit Framework  A database of exploits  Provides information about security vulnerabilities  Goal: Aid in penetration testing and IDS signature development  In the wrong hands: • Can be used to exploit those same vulnerabilities with relative ease  Exploits for almost every kind of system – from Mac OSX to Windows to Linux to Android phones  Has a GUI available too – Armitage Titel Attack Frameworks and Tools 19

  20. Network Security Tools  Metasploit Framework  How easy it is? • Select an exploit from the database • Select a payload • Decide upon an obfuscation or encoding scheme • ANY EXPLOIT CAN BE ATTACHED WITH ANY PAYLOAD  Types of exploits: • Passive – wait for targets to connect in and then try to exploit their systems • Active – target system attacked directly  “ Autopwn ” feature – tries to automatically exploit and inject itself into target system • Makes life easy for an attacker! Titel Attack Frameworks and Tools 20

  21. Network Security Tools  Metasploit Framework  Problems? • Exploits caught by anti-virus software (primarily of E-Mail providers) if not local systems anti-virus – SPREADING THE PAYLOAD BECOMES DIFFICULT! • Many exploits released after the vulnerabilities have been patched in software updates Titel Attack Frameworks and Tools 21

  22. Network Security Tools Where the  SQLMap vulnerability exists  SQL Injection Vulnerabilities • Script checks possible SQL injection inputs on the Web Control Data application Channel Channel • Vulnerability scanning  Many such scanners exist like,  JoomScan – Joomla CMS Scanner  WPScan – Wordpress Scanner Titel Attack Frameworks and Tools 22

  23. Denial Of Service Tools  Attacks : Availability Bandwidth Server Server Bandwidth Titel Attack Frameworks and Tools 23

  24. Denial Of Service Tools  Attacks : Availability  Other scenarios exist too  Example: IPv6 DOS Attack  Effects on Organziations:  Loss of revenues in recent years  Loss of user trust on organisations  Recently: Christmas Day 2014 DOS Attacks on Playstation Networks and XBOX Live Titel Attack Frameworks and Tools 24

  25. Denial Of Service Tools  LOIC – “Low Orbit Ion Cannon”  “ Hivemind ” feature – Distributed Denial Of Service Favourite of “Hacktivists”   Minimal knowledge of networks required  Flood Multiple requests to the Server Titel Attack Frameworks and Tools 25

  26. Titel Attack Frameworks and Tools 26

  27. Denial Of Service Tools  HULK – “HTTP Unbearable Load King”  Generate unique requests every single time • Additional random page names added • Random Query Strings appended • Source Client information changed Titel Attack Frameworks and Tools 27

  28. Conclusions  Is it that easy to hack?  Probably not • Password crackers – Require massive computing power • Metasploit Payloads – Detected by anti-virus software – Patches before vulnerabilities published (usually) • Nmap Fingerprinting – Can be blocked by active monitoring • SQL Injection becoming less common as developers become more aware • Denial of Service – still can occur – Difficult to mitigate – Used extensively by “ hactivist ” groups  Unpatched systems and old websites may still be vulnerable Titel Attack Frameworks and Tools 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend