150 likes | 291 Vues
This guide offers crucial insights into the tools and techniques for compromising Unix systems. It covers essential aspects of information gathering, including both active and passive techniques, as well as various tools like Nmap, Tcpdump, and Dsniff. You'll learn about different types of attacks, including Man-in-the-Middle (MiTM) and Denial of Service (DoS) attacks, along with basic exploits. The content emphasizes the importance of understanding detection mechanisms and effective strategies for escalation and maintaining access. Perfect for security professionals and ethical hackers alike.
E N D
An Introduction to Tools and Techniques. -Mike Sconzo Compromising a Unix Host
Important Things • Information Gathering • Techniques • Active, passive • Tools • Nmap, ping, mtr, traceroute, dig, ettercap, Xprobe2, p0f, Nessus, tcpdump, Dsniff • Types of Attacks • Basic Exploit • What to look for
Active vs. Passive • Passive • Harder for people to detect (especially if truly passive) • Sometimes less accurate results • Tools • Tcpdump, p0f, dsniff, ettercap (sometimes), ethereal • Active • Easy to detect, especially if used in 'default' configuration, can usually make it 'harder' to detect • Usually more accurate • Tools • Ping, traceroute, Xprobe2, Nmap, ettercap, Nessus, MTR
Passive Tools • Tcpdump • Sniffer, easy to detect if not run correctly • Effective and easy to use • p0f • Passive OS detection, harder to detect. • ettercap • Swiss army knife of network hijacking! • Many of the features of Dsniff, but expanded, can MiTM some services, and generally cause problems :) • Dsniff • Tool/suite of tools for password recon, and other things
Active Tools • Ping • Check to see if a host is alive ... other uses? • Traceroute • Find the path to a host ... other uses/benefits of knowing path? • MTR • Ping + Traceroute! • Xprobe2 • Active OS fingerprinting using ICMP • Nmap • Active OS fingerprinting, open ports, service versioning and more!
Active Tools continued • ettercap • Arp spoof (many uses), passive OS fingerprinting, MiTM, kill connections (similar to hunt), and ... you can write your own plugins! • Nessus • Vulnerability (!!) scanner, expandable, 'new hotness'
Types of Attacks • Man in The Middle (MiTM) • Sit between target and victim • For some defination of “between” • Denial of Service (DoS) • Deny access to the box/service • Social Engr. • Attack the weakest link • 'spliot • Buffer overflow, format string vuln etc...?
MiTM • Multiple ways/services to attack • SSH (example) • Ssh mitm v2 – proxy • v1 – not cryptographically secure! • Maybe force v1 connection? • Arp spoof, dns spoof • Other ideas?
DoS • Deny access to something • Login Host (example) • ICMP flood (humm...what can do this?) • SYN flood (use up available 'connections') • Lots more! • Considered a 'lame' attack by itself • But, serves a purpose ....
Social Engr. • Go after people • Why guess the password when somebody could tell it to you? • Get somebody to install a vulnerable version of a program. Because a sys-admins job is giving his users something to use. • Could be the latest version of something, but if you did a code audit, you may know something secret (aka 0-day).
'sploits • Attacks in a can • Easy to use • Easy to find • Used by the lowest common denominator! • Effective on systems that have not been patched/configured correctly • Why do the hard stuff, if the low hanging fruit is a knee level? • Excellent way to learn
Basic Attack • We have gathered some information • passive/active • Maybe we did a code audit, and found a 0-day to get on the box, or perhaps we downloaded something • But only got 'user' privs. Bummer, we want r00t! • Now what? Time to find a local exploit! • What to look at? • Kernel, daemons, set-uid programs, why? • Escalate privs • Cover your tracks • Wipe logs, fun with tripwire!
How do we get back in? • Rootkit? • Lots to choose from • Unfortunately most are easily detectable • Custom write one, maybe • Rogue accounts • Good choice, but easily detectable • Why not an account that's already on the machine with sudo? • Simple Backdoor • NetCat (nc)
References • http://www.insecure.org/ • http://ettercap.sourceforge.net/ • http://www.sys-security.com/html/projects/X.html • http://lcamtuf.coredump.cx/p0f.tgz • http://www.nessus.org/ • http://www.bitwizard.nl/mtr/