Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold - - PowerPoint PPT Presentation

attack frameworks and tools
SMART_READER_LITE
LIVE PREVIEW

Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold - - PowerPoint PPT Presentation

Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universitt Mnchen, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet Technologies and Mobile


slide-1
SLIDE 1

Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany

Attack Frameworks and Tools

Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet Technologies and Mobile Communication WS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München

slide-2
SLIDE 2

Titel

2

Overview

 Introduction  Overview of Tools  Password Crackers  Network Poisoners  Network Security Tools  Denial of Service Tools  Concluding remarks

Attack Frameworks and Tools

slide-3
SLIDE 3

Titel

3

Introduction

 Network Security – perhaps the most important aspect of communications in todays world  How easy it is to attack a target system or network today?

  • Tools automate most of the work
  • From fingerprinting your target to attacking
  • Knowledge requirements decrease day by day

Attack Frameworks and Tools

slide-4
SLIDE 4

Titel

4

Introduction

 The CIA Triangle Confidentiality Availability Integrity

Attack Frameworks and Tools

slide-5
SLIDE 5

Titel

5

Overview of the Tools

 Password Crackers

Cain and Abel

  • Free
  • Windows

Only GUI

John the Ripper

  • Free
  • Various

Platforms

Hashcat

  • Free
  • Linux,

OSX and Windows

Attack Frameworks and Tools

slide-6
SLIDE 6

Titel

6

Overview of the Tools

 Network Poisoners

ZARP

  • Free
  • Python

Script

Ettercap

  • Free
  • Various

Platforms

Attack Frameworks and Tools

slide-7
SLIDE 7

Titel

7

Overview of the Tools

 Network Security Tools

Nmap

  • Free
  • Various

Platforms

Metasploit

  • Free

(Signup Required)

  • Windows

and Linux

Sqlmap

  • Free
  • Python

Script

Attack Frameworks and Tools

slide-8
SLIDE 8

Titel

8

Overview of the Tools

 Denial of Service Tools

LOIC

  • Free
  • Windows

Only GUI

HULK

  • Free
  • Python

Script

Attack Frameworks and Tools

slide-9
SLIDE 9

Titel

9

Password Crackers

 Attack: Confidentiality  Crack passwords or keys  Crack various kind of hashes  Initially used to crack local system passwords like for Windows and Linux  Have extended to include numerous kinds of hashes  New versions are faster and use different kind of cracking methods

  • GPU based password cracking also possible and is faster than CPU based

 Primarily: Brute forcing or Dictionary based attacks

Attack Frameworks and Tools

slide-10
SLIDE 10

Titel

10

Password Crackers

 Cain and Abel

  • Windows based
  • Widely used to crack Windows Passwords (LM Hashes and NTLM Hashes)
  • Has built-in sniffer
  • Can sniff web session passwords
  • Can analyse SSH-1 or HTTPS traffic
  • Needs:
  • Rainbow tables for effective hash cracking
  • Size of table – impediment!

– However, this is an issue with all password crackers and related to password lengths and reverse hash lookups

Attack Frameworks and Tools

slide-11
SLIDE 11

Titel

11

Password Crackers

 John the Ripper

  • Like Cain and Abel - Dictionary based and Brute force methods available
  • Comes with various character sets
  • Can crack numerous kinds of hashes
  • Brute force can for obvious reasons take a huge amount of time
  • Dictionaries could go up to petabytes
  • Cracking time could be in excess of decades for even a 8 character password
  • Normal machines: Impossible

– Solution: Good dictionaries?

Attack Frameworks and Tools

slide-12
SLIDE 12

Titel

12

Password Crackers

 Hashcat

  • Like the previous tools – However claims to be “fastest password

cracker” with proprietary cracking algorithms

  • Vs. Cain and Abel & John the Ripper - Offers various kinds of attacks
  • 8 kinds of attacks
  • Example: Combinator attack – combine each word in dictionary to every
  • ther word in it
  • Example: Hybrid attack – Half of password from dictionary and rest from

brute force

  • HENCE, INCREASES EFFECTIVENESS OF A DICTIONARY
  • A GPU Based cracker – “oclHashcat” available - faster

Attack Frameworks and Tools

slide-13
SLIDE 13

Titel

13

Network Poisoners

 Attack: Integrity of the Network

  • Can lead to loss of

confidentiality and availability too  Prime goal : ARP Poisoning

  • Pose as another machine
  • n the Network

Attack Frameworks and Tools

slide-14
SLIDE 14

Titel

14

Network Poisoners

 Once done:

  • Pose as DNS Server
  • Pose as DHCP Server
  • Pose as the default gateway
  • Perform Data Sniffing
  • Man in the Middle Attacks (MITM)
  • and a lot more…

 Even HTTPS traffic is not safe (tool called SSLStrip) – yet another tool that can be used without much insights.

Attack Frameworks and Tools

slide-15
SLIDE 15

Titel

15

Network Poisoners

 ZARP

  • Suite of Poisoners
  • Includes Sniffers
  • Plans to be a central network poisoning/administration tool
  • Can manage active sessions of poisoning/sniffing
  • Still being developed

Attack Frameworks and Tools

slide-16
SLIDE 16

Titel

16

Network Poisoners

 Ettercap

  • GUI available too!
  • Plugins offer support for

further complex attacks like:

  • DNS Poisoning
  • DHCP Poisoning

Attack Frameworks and Tools

slide-17
SLIDE 17

Titel

17

Network Security Tools

 Covers wide array of tools  Most were created for vulnerability testing and easing the job of network administrators  Today are used to test how secure a system is  But are also infamous for their misuse by hackers

Attack Frameworks and Tools

slide-18
SLIDE 18

Titel

18

Network Security Tools

 Nmap

  • Network Scanner
  • A powerful tool to scan networks
  • Used for (not exclusive list):
  • OS fingerprinting
  • Host Discovery
  • Port Scanning

Attack Frameworks and Tools

slide-19
SLIDE 19

Titel

19

Network Security Tools

 Metasploit Framework

  • A database of exploits
  • Provides information about security vulnerabilities
  • Goal: Aid in penetration testing and IDS signature development
  • In the wrong hands:
  • Can be used to exploit those same vulnerabilities with relative ease
  • Exploits for almost every kind of system – from Mac OSX to Windows to Linux to

Android phones

  • Has a GUI available too – Armitage

Attack Frameworks and Tools

slide-20
SLIDE 20

Titel

20

Network Security Tools

 Metasploit Framework

  • How easy it is?
  • Select an exploit from the database
  • Select a payload
  • Decide upon an obfuscation or encoding scheme
  • ANY EXPLOIT CAN BE ATTACHED WITH ANY PAYLOAD
  • Types of exploits:
  • Passive – wait for targets to connect in and then try to exploit their systems
  • Active – target system attacked directly
  • “Autopwn” feature – tries to automatically exploit and inject itself into target system
  • Makes life easy for an attacker!

Attack Frameworks and Tools

slide-21
SLIDE 21

Titel

21

Network Security Tools

 Metasploit Framework

  • Problems?
  • Exploits caught by anti-virus software (primarily of E-Mail providers) if not local systems anti-virus

– SPREADING THE PAYLOAD BECOMES DIFFICULT!

  • Many exploits released after the vulnerabilities have been patched in software updates

Attack Frameworks and Tools

slide-22
SLIDE 22

Titel

22

Network Security Tools

 SQLMap

  • SQL Injection Vulnerabilities
  • Script checks possible SQL

injection inputs on the Web application

  • Vulnerability scanning

 Many such scanners exist like,

  • JoomScan – Joomla CMS Scanner
  • WPScan – Wordpress Scanner

Control Channel Data Channel

Where the vulnerability exists

Attack Frameworks and Tools

slide-23
SLIDE 23

Titel

23

Denial Of Service Tools

 Attacks : Availability

Bandwidth Bandwidth

Server Server

Attack Frameworks and Tools

slide-24
SLIDE 24

Titel

24

Denial Of Service Tools

 Attacks : Availability

  • Other scenarios exist too
  • Example: IPv6 DOS Attack
  • Effects on Organziations:
  • Loss of revenues in recent years
  • Loss of user trust on organisations
  • Recently: Christmas Day 2014 DOS Attacks on Playstation Networks and

XBOX Live

Attack Frameworks and Tools

slide-25
SLIDE 25

Titel

25

Denial Of Service Tools

 LOIC – “Low Orbit Ion Cannon”

  • “Hivemind” feature – Distributed Denial Of Service
  • Favourite of “Hacktivists”
  • Minimal knowledge of networks required
  • Flood Multiple requests to the Server

Attack Frameworks and Tools

slide-26
SLIDE 26

Titel

26

Attack Frameworks and Tools

slide-27
SLIDE 27

Titel

27

Denial Of Service Tools

 HULK – “HTTP Unbearable Load King”

  • Generate unique requests every single time
  • Additional random page names added
  • Random Query Strings appended
  • Source Client information changed

Attack Frameworks and Tools

slide-28
SLIDE 28

Titel

28

Conclusions

 Is it that easy to hack?

  • Probably not
  • Password crackers – Require massive computing power
  • Metasploit Payloads

– Detected by anti-virus software – Patches before vulnerabilities published (usually)

  • Nmap Fingerprinting – Can be blocked by active monitoring
  • SQL Injection becoming less common as developers become more aware
  • Denial of Service – still can occur

– Difficult to mitigate – Used extensively by “hactivist” groups

  • Unpatched systems and old websites may still be vulnerable

Attack Frameworks and Tools

slide-29
SLIDE 29

Titel

29

Conclusions

 However new tools are always available

  • Example: Dendroid – Android Hijack Tool
  • Available/Leaked on the Deep Web with ease
  • Simple web based interface
  • Patch might still take time to come – Google not patching older Android OSs
  • More users becoming aware of .onion, .i2p, etc domains

– Once again: Ease of use and easy availability leads to anyone using the tools

 Black hat community will always have new tools  Normal users do not need massive know-how to carry out attacks

  • Success however can be limited

Attack Frameworks and Tools

slide-30
SLIDE 30

Titel

30

Thank you!

Your questions and comments are welcomed…

Attack Frameworks and Tools