-
If acquisition and non intrusive probing have not turned up any results, then an attacker will next turn to identifying valid user accounts or poorly protected resource shares.
-
Enumeration involves active connections to systems and directed queries.
-
The type of information enumerated by intruders:
-
Network resources and shares
-
Users and groups
-
Applications and banners
The objective of the attacker will be to identify valid user accounts or groups where he can remain inconspicuous once he has compromised the system. Enumeration involves active connections being made to the target system, or subjecting it to directed queries made to a system. Normally, an alert and secure system will log such attempts. Often the information gathered is what the target might have made public - such as a DNS address. However, it is possible that the attacker stumbles upon a remote IPC share such as the IPC$ in windows, that can be probed with a null session and shares and accounts enumerated.
Concept On ascertaining the security posture of the target, the attacker can turn this information to this advantage by exploiting some resource sharing protocol or compromising an account. The type of information enumerated by hackers can be loosely grouped into the following categories:
-
Network resources and shares
-
Users and Groups
-
Applications and Banners
---
Amarjit Singh
-
-
Share This Post With Your Friends
Saturday, April 11, 2009
What is Enumeration ???
Friday, April 10, 2009
What is Enumeration ??
- Understanding Windows 2000 enumeration
- How to Connect via Null Session
- How to disguise NetBIOS Enumeration
- Disguise using SNMP enumeration
- How to steal Windows 2000 DNS information using zone transfers
- Learn to enumerate users via CIFS/SMB
- Active Directory enumerations
Thursday, April 9, 2009
HTTPort - Bypass an HTTP proxy
HTTPort allows you to bypass an HTTP proxy, which is blocking you from the Internet. With HTTPort you may use the following software (just a sample list, not limited to !) from behind an HTTP proxy: e-mail, IRC, ICQ, news, FTP, AIM, any SOCKS capable software, etc. etc. |
The basic idea is that you set up your Internet software in such a manner, that it considers your local PC to be a remote server it needs. This is where HTTPort enters. It intercepts connection from this software and runs the connection through the proxy - this is called a tunneling. Your software should use TCP/IP. HTTPort does not work with UDP/IP. There are two ways you can set up your software for use with HTTPort:
-
If your software uses a single (small range of) fixed server with a single (small range of) fixed port: For instance your software would like to connect to some.server.com:some_port. Create a new HTTPort mapping, with any local port, preferably above 1024, remote server of "some.server.com" and remote port of "some_port". Point your software to 127.0.0.1:mapped_local_port as if it was the original server it needs.
-
If your software can connect through SOCKS4 proxy: Point your software to 127.0.0.1:1080, which is a built-in HTTPort SOCKS4 server.
---
Amarjit Singh
Bypassing Firewall using Httptunnel
Here is how htc sends data to the destination:
-
Open TCP connection to hts
-
Send HTTP POST with a large Content-Length
-
Send TUNNEL_DATA packets until POST Content-Length would be exceeded.
-
Send TUNNEL_PADDING packets to exactly satisfy Content-Length - 1
-
Send TUNNEL_DISCONNECT (1 byte)
-
Close TCP connection
-
Go to step 1
Here is how htc gets data from the destination.
-
Open TCP connection to hts
-
Send HTTP GET
-
Wait for response from hts
-
Read TUNNEL_DATA, then TUNNEL_PADDING, TUNNEL_DISCONNECT packets
-
Close TCP connection
-
Go to step 1
Tunnel creation and destruction
This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall.
---
Amarjit Singh
Wednesday, April 8, 2009
Tool: eMailTrackerPro
Tool: VisualRoute Mail Tracker
Tools-VisualLookout
Tool: SmartWhois
Tool: VisualRoute Trace
Tool: NeoTrace (Now McAfee Visual Trace)
Traceroute
Tool-ARIN
OrgName: |
Google Inc. |
||||
OrgID: |
GOGL |
||||
Address: |
2400 E. Bayshore Parkway |
||||
City: |
Mountain View |
||||
StateProv: |
CA |
||||
PostalCode: |
94043 |
||||
Country: |
US |
||||
|
|||||
NetRange: |
216.239.32.0 - 216.239.63.255 |
||||
CIDR: |
216.239.32.0/19 |
||||
NetName: |
|
||||
NetHandle: |
NET--32-0-1 |
||||
Parent: |
NET-216-0-0-0-0 |
||||
NetType: |
Direct Allocation |
||||
NameServer: |
NS1.GOOGLE.COM |
||||
NameServer: |
NS2.GOOGLE.COM |
||||
NameServer: |
NS3.GOOGLE.COM |
||||
NameServer: |
NS4.GOOGLE.COM |
||||
Comment: |
|||||
RegDate: |
2000-11-22 |
||||
Updated: |
2001-05-11 |
||||
|
|||||
TechHandle: |
ZG39-ARIN |
||||
TechName: |
Google Inc. |
||||
TechPhone: |
+1--0200 |
||||
TechEmail: |
<> |
||||
Attack Methods |
From the Nslookup query, an attacker can find name servers, mail exchange servers and also what class they belong to. The mail exchange servers can be further resolved into IP addresses. He can then enumerate the network further by doing a reverse IP lookup. |
||||
In this case, we look up 216.239.33.25 which is the IP of smtp1.google.com
The query gives the following result.
25.33.239.216.in-addr.arpa |
PTR |
smtp1.google.com |
33.239.216.in-addr.arpa |
NS |
ns1.google.com |
33.239.216.in-addr.arpa |
NS |
ns2.google.com |
33.239.216.in-addr.arpa |
NS |
ns3.google.com |
33.239.216.in-addr.arpa |
NS |
ns4.google.com |
ns1.google.com |
A |
216.239.32.10 |
ns2.google.com |
A |
216.239.34.10 |
ns3.google.com |
A |
216.239.36.10 |
ns4.google.com |
A |
216.239.38.10 |
Note that the IP actually points to .arpa domain. Further, we also retrieve more information on the name servers.
Tuesday, April 7, 2009
Top Traffic Exchange Sites for Blogs
- BlogToplist.com
- bNET Topsites
- BlogTopsites.com
- Blogracy.com
- BlogMad.net
- BlogAzoo.com
- BlogSoldiers.com
- BlogExplosion.com
- BlogAdvance.com
Anonymizers- Make your web surfing anonymous
-
Anonymizers are services that help make your own web surfing anonymous.
-
The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrell.
-
An anonymizer removes all the identifying information from a user's computers while the user surfs the Internet, thereby ensuring the privacy of the user.
Many anonymizer sites create an anonymized URL by appending the name of the site the user wishes to access to their own URL, e.g.:
http://anon.free.anonymizer.com/http://www.yahoo.com/
After the user anonymizes a web access with an anonymizer prefix, every subsequent link selected is also automatically accessed anonymously. Most anonymizers can anonymize at least the web (http:), file transfer protocol (ftp:), and gopher (gopher:) Internet services.
However, anonymizers have the following limitations:
-
HTTPS. Secure protocols like "https:" cannot be properly anonymized, since the browser needs to access the site directly to properly maintain the secure encryption.
-
Plugins. If an accessed site invokes a third-party plugin, then there is no guarantee that they will not establish independent direct connections from the user computer to a remote site.
-
Logs. All anonymizer sites claim that they don't keep a log of requests. Some sites, such as the Anonymizer, keep a log of the addresses accessed, but don't keep a log of the connection between accessed addresses and users logged in.
-
Java. Any Java application that is accessed through an anonymizer will not be able to bypass the Java security wall.
-
Active X. Active-X applications have almost unlimited access to the user's computer system.
-
JavaScript. The JavaScript scripting language is disabled with url-based anonymizers
Some anonymizer sites are:
-
Anonymizer.com
-
Anonymize.net
-
@nonymouse.com
-
Iprive.com
-
MagusNet Public Proxy
-
MuteMail.com PublicProxyServers.com
-
Rewebber.de
-
SilentSurf.com
-
Surfola.com
-
Ultimate-anonymity.com
---
Amarjit Singh
-
Proxy Servers - Protection against hacking attacks
Proxy is a network computer that can serve as an intermediate for connection with other computers. They are usually used for the following purposes:
-
As firewall, a proxy protects the local network from outside access.
-
As IP-addresses multiplexer, a proxy allows to connect a number of computers to Internet when having only one IP-address
-
Proxy servers can be used (to some extent) to anonymize web surfing.
-
Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.
-
Proxy servers can afford some protection against hacking attacks.
The program Wingate is often used as proxy. Quite a number of such proxies are open to easy access. Anonymous proxies hide the real IP address (and sometimes other information) from websites that the user visits. There are two sorts; ones can be used in the same way as the non-anonymous proxies above, and web-based anonymizers.
Using a non-anonymous proxy:
HTTP_X_FORWARDED_FOR = 62.64.175.55, 194.72.9.37. This shows the IP address (first number) and possibly the IP address of the proxy server used (second).
Using an anonymous proxy:
HTTP_X_FORWARDED_FOR = 66.51.107.3 This now only shows the IP address of the proxy.
---
Amarjit Singh
Cheops-Network management tool-equivalent of a Swiss-army knife
Monday, April 6, 2009
Passive Fingerprinting
- Passive fingerprinting is also based on the differential implantation of the stack and the various ways an OS responds to it.
- However, instead of relying on scanning the target host, passive fingerprinting captures packets from the target host and study it for tell tale signs that can reveal the OS.
- Passive fingerprinting is less accurate than active fingerprinting.
Active Stack Fingerprinting: This technique is called OS fingerprinting
- Fingerprinting is done to determine the remote OS
- Allows attacker to leave smaller footprint and have greater chance to succeed
- Based on the fact that various OS vendors implement the TCP stack differently
- Specially crafted packets sent to remote OS and response is noted. This is compared with a database to determine the OS
Tool: Super Scan - Port scanner
Tool: NetScan Tools Pro
Ethical Hacker and Scanning Tools
IPsec is the short for IP Security. It is a set of protocols developed by the IETF to support secure exchange of packets at the IP layer.
IPsec = AH + ESP + IPcomp + IKE
Authentication Header (AH): provides authenticity guarantee for packets, by attaching strong crypto checksum to packets. If a packet is received with AH and the checksum operation is successful, it indicates that the packet was originated by the expected peer (the packet was not generated by impersonator) and that the packet was not modified in transit. Unlike other protocols, AH covers the whole packet, from the IP header to the end of the packet.
Encapsulating Security Payload (ESP) provides confidentiality guarantee for packets, by encrypting packets with encryption algorithms. If a packet is received with ESP and successfully decrypted it indicates that the packet was not wiretapped in the middle, if the sender and the receiver share a secret key, and no other party knows the key.
ESP provides encryption service to the packets. However, encryption tends to give negative impact to compression on the wire (such as ppp compression). IP Compression (IPcomp) provides a way to compress packet before encryption by ESP.
As discussed above, AH and ESP need shared secret key between peers. For communication between distant locations, there is a need to provide ways to negotiate keys in secrecy. Internet Key Exchange (IKE) makes this possible.
IPsec has been deployed widely to implement Virtual Private Networks (VPNs). IPsec supports two encryption modes: Transport and Tunnel.
Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet.
For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates.
Note security of IPsec protocols depend on the secrecy of secret keys. If secret keys are compromised, IPsec protocols can no longer be secure.
Reference for readers: Old IPsec suite - RFC1825, New IPsec suite - RFC2401