SlideShare una empresa de Scribd logo
1 de 55
Descargar para leer sin conexión
HackEire 2009

                   by @markofu


http://www.hackeire.net      @hackeire
Aim of this Presentation


Ø Provide overview of how we compromised this
   Environment.

Ø Note this is not the only way that you can
   compromise this environment.

Ø There may be a number of methods that could
   result in the same compromise of Data.

HackEire -2009 19/11/2009         Copyright © 2009 IRISS   www.irissie   2
The Scope

Ø The ‘Bhratach’ company has requested a full
   Black-Box test.
Ø This presence is hosted within the company and
   is connected to the company's internal corporate
   LAN.
Ø Testing consists of the external DMZ and Internal
   LAN.
Ø Use any tools that you legally own to test this
   network.
Ø Identify any vulnerabilities with this environment?
HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   3
The Reconnaissance

Ø Identify the Network.




Ø The tools that we used for Reconnaissance:
       §  NMAP
       §  Nessus




HackEire -2009 19/11/2009    Copyright © 2009 IRISS   www.irissie   4
NMAP

Ø Use NMAP –sP 10.0.1.0/23




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   5
NMAP
           Nmap –sT –vv –A 10.0.1.25




                               DNS Server
HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   6
NMAP
           Nmap –sT –vv –A 10.0.1.40




                             SMTP Server
HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   7
NMAP
           Nmap –sT –vv –A 10.0.1.50




                               Web Server
HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   8
Nessus
           Nessus Output




                               Web Server
HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   9
10.0.1.25
           DNS Server




 Zone Transfer & then ‘nmap –vv –A –iL ips.txt’
HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   10
10.0.1.25
           DNS Server




                            Enum –u 10.0.1.25
HackEire -2009 19/11/2009    Copyright © 2009 IRISS   www.irissie   11
10.0.1.25
           Brute force the smb accounts




                       Hydra –t 1 –w 0 –l Lyray –p 1234 10.0.1.25 smbnt

HackEire -2009 19/11/2009            Copyright © 2009 IRISS   www.irissie   12
10.0.1.25
           Identify any potential Buffer Overflow




                            Server vulnerable to MS 08-067 exploit

HackEire -2009 19/11/2009            Copyright © 2009 IRISS   www.irissie   13
10.0.1.25
           Exploiting the Buffer Overflow




                            Server vulnerable to MS 08-067 exploit

HackEire -2009 19/11/2009            Copyright © 2009 IRISS   www.irissie   14
10.0.1.25
           Get shell & transfer netcat via ftp




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   15
10.0.1.25
           Transfer ‘pwdump’




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   16
10.0.1.25
           Extract new tools J




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   17
10.0.1.25
           Setting up netcat persistent Listener




                                 With a shell J

HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   18
10.0.1.25
           Connect via Netcat from Attacker system




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   19
10.0.1.25
  Through netcat, now on 10.0.1.25 (see LHS)




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   20
10.0.1.25
           Dumping the password file




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   21
10.0.1.25
           Transferring the password dump




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   22
10.0.1.25
           And the keyrings…..




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   23
10.0.1.25
           Use ‘John’ on the Password Dump




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   24
10.0.1.40
           Using compromised Lyray account




                     SSH to 3456 using username Lyray password 1234

HackEire -2009 19/11/2009         Copyright © 2009 IRISS   www.irissie   25
10.0.1.40
           Identify the Linux Kernel




            Use this to identify if there are vulnerabilities with the Kernel

HackEire -2009 19/11/2009         Copyright © 2009 IRISS   www.irissie          26
10.0.1.40
           Look for the word exploit




   These have been left lying around by a careless sysadmin who was
                             testing a patch
HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie      27
10.0.1.40
           Identify the exploit directory




These have been installed by a previous attacker via the FTP protocol.

HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie     28
10.0.1.40
           Run the exploit




These have been installed by a previous attacker via the FTP protocol.

HackEire -2009 19/11/2009    Copyright © 2009 IRISS   www.irissie    29
10.0.1.40
           FTP to your attacker system




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   30
10.0.1.40
              Upload the flags




Using FTP upload the Flags or you may use SCP over port 3456 (more secure)

   HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   31
10.0.1.40
           Grab the Password Files




                      Using FTP upload the passwd and shadow file

HackEire -2009 19/11/2009          Copyright © 2009 IRISS   www.irissie   32
10.0.1.40
           Get the ‘willy’ password




                    Using John ‘unshadow’ the merged password file.

HackEire -2009 19/11/2009          Copyright © 2009 IRISS   www.irissie   33
10.0.1.50
           View the front page and source code




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   34
10.0.1.50
        Nmap show ‘webadmin’ up…what’s there?




                            Look for the shell directory on port 10000

HackEire -2009 19/11/2009               Copyright © 2009 IRISS   www.irissie   35
10.0.1.50
           Connect to the Website




                            Enumerate the directories

HackEire -2009 19/11/2009       Copyright © 2009 IRISS   www.irissie   36
10.0.1.50
           Shell vulnerability….




       Create a User & SSH on as that user
HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   37
10.0.1.50
           Or use Metatron to SSH




                            Cd & ‘ls -la’ the directories

HackEire -2009 19/11/2009        Copyright © 2009 IRISS   www.irissie   38
10.0.1.50
           Transfer the flags - e.g. Winscp




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   39
10.0.1.50
           ifconfig -a




                            4th flag & ‘pii’ file must be on 10.0.2.75

HackEire -2009 19/11/2009              Copyright © 2009 IRISS   www.irissie   40
10.0.1.50
           Identify the fourth server




                            Use arp to get all connected servers

HackEire -2009 19/11/2009            Copyright © 2009 IRISS   www.irissie   41
10.0.1.50
           Port scan with netcat




      SQL back-end? What’s 3333? SMB,
      netbios – transfer files?


HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   42
10.0.1.50
           Tcpdump shows something also….




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   43
10.0.1.50
           As root - ‘crontab -l’




                            Looks interesting……

HackEire -2009 19/11/2009     Copyright © 2009 IRISS   www.irissie   44
10.0.1.50
           Ps auwx |grep asriel




                            Looks interesting……

HackEire -2009 19/11/2009     Copyright © 2009 IRISS   www.irissie   45
10.0.2.75
           Identify shares on 10.0.2.75




                            Use a ‘valid’ account to enumerate

HackEire -2009 19/11/2009           Copyright © 2009 IRISS   www.irissie   46
10.0.2.75
           Connecting via Asriel Share….




      Transfer the keyrings to 10.0.1.50 & from there to system via scp

HackEire -2009 19/11/2009     Copyright © 2009 IRISS   www.irissie        47
10.0.2.75
           Asriel Share?




      Transfer the keyrings to 10.0.1.50 & from there to system via scp

HackEire -2009 19/11/2009     Copyright © 2009 IRISS   www.irissie        48
10.0.2.75
Temp Share…remember ‘Competitor Pack’




      Transfer the keyrings to 10.0.1.50 & from there to system via scp

HackEire -2009 19/11/2009     Copyright © 2009 IRISS   www.irissie        49
10.0.2.75
           Transferring final flag to 10.0.1.50….




HackEire -2009 19/11/2009   Copyright © 2009 IRISS   www.irissie   50
10.0.2.75
Scheduled Netcat Listener on Port 3333
Decryption
What am I?
Running pii.csv
Decode me?
Hydan…..
Who is Andrew Wiles?

   Fermat s Last Theorem



x^n + y^n ≠ z^n

where n is integer >2

& x,y,z Ε Ζ

Más contenido relacionado

Similar a HackEire 2009

Hack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingHack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingTom Keetch
 
Simon Laws – Apache Flink Cluster Deployment on Docker and Docker-Compose
Simon Laws – Apache Flink Cluster Deployment on Docker and Docker-ComposeSimon Laws – Apache Flink Cluster Deployment on Docker and Docker-Compose
Simon Laws – Apache Flink Cluster Deployment on Docker and Docker-ComposeFlink Forward
 
Fulcrum Group Virtualization How does It Fit
Fulcrum Group Virtualization How does It FitFulcrum Group Virtualization How does It Fit
Fulcrum Group Virtualization How does It FitSteve Meek
 
fiware-lab-dev-5.pdf
fiware-lab-dev-5.pdffiware-lab-dev-5.pdf
fiware-lab-dev-5.pdfssuser8c74ba
 
Python on Cloud Foundry
Python on Cloud FoundryPython on Cloud Foundry
Python on Cloud FoundryIan Huston
 
Poodle sha2 open mic
Poodle sha2 open micPoodle sha2 open mic
Poodle sha2 open micRahul Kumar
 
Website security systems
Website security systemsWebsite security systems
Website security systemsMobile88
 
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Priyanka Aash
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...PROIDEA
 
Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5
Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5
Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5Antonio Musarra
 
la historia de internet
la historia de internetla historia de internet
la historia de internetpatri leal
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Jeremiah Grossman
 
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...Amazon Web Services
 
Technology And Life
Technology And LifeTechnology And Life
Technology And LifeSunil Swain
 
Technology And Life
Technology And LifeTechnology And Life
Technology And LifeSunil Swain
 
Storage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsStorage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsAmbareesh Kulkarni
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceAlfredo Boiero Sanders
 

Similar a HackEire 2009 (20)

Hack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical SandboxingHack In Paris 2011 - Practical Sandboxing
Hack In Paris 2011 - Practical Sandboxing
 
Simon Laws – Apache Flink Cluster Deployment on Docker and Docker-Compose
Simon Laws – Apache Flink Cluster Deployment on Docker and Docker-ComposeSimon Laws – Apache Flink Cluster Deployment on Docker and Docker-Compose
Simon Laws – Apache Flink Cluster Deployment on Docker and Docker-Compose
 
Deep inside TOMOYO Linux
Deep inside TOMOYO LinuxDeep inside TOMOYO Linux
Deep inside TOMOYO Linux
 
Fulcrum Group Virtualization How does It Fit
Fulcrum Group Virtualization How does It FitFulcrum Group Virtualization How does It Fit
Fulcrum Group Virtualization How does It Fit
 
fiware-lab-dev-5.pdf
fiware-lab-dev-5.pdffiware-lab-dev-5.pdf
fiware-lab-dev-5.pdf
 
Python on Cloud Foundry
Python on Cloud FoundryPython on Cloud Foundry
Python on Cloud Foundry
 
Poodle sha2 open mic
Poodle sha2 open micPoodle sha2 open mic
Poodle sha2 open mic
 
Website security systems
Website security systemsWebsite security systems
Website security systems
 
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
 
Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5
Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5
Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5
 
App armor structure
App armor structureApp armor structure
App armor structure
 
la historia de internet
la historia de internetla historia de internet
la historia de internet
 
Kamailio on Docker
Kamailio on DockerKamailio on Docker
Kamailio on Docker
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...
 
Technology And Life
Technology And LifeTechnology And Life
Technology And Life
 
Technology And Life
Technology And LifeTechnology And Life
Technology And Life
 
Storage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsStorage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information Applications
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 

Más de Mark Hillick

Peeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security OnionPeeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security OnionMark Hillick
 
Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDBMark Hillick
 
PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)Mark Hillick
 
Integrated Cache on Netscaler
Integrated Cache on NetscalerIntegrated Cache on Netscaler
Integrated Cache on NetscalerMark Hillick
 
Scareware Traversing the World via Ireland
Scareware Traversing the World via IrelandScareware Traversing the World via Ireland
Scareware Traversing the World via IrelandMark Hillick
 
Implementing a WAF
Implementing a WAFImplementing a WAF
Implementing a WAFMark Hillick
 
CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!Mark Hillick
 
MongoDB - Who, What & Where!
MongoDB - Who, What & Where!MongoDB - Who, What & Where!
MongoDB - Who, What & Where!Mark Hillick
 

Más de Mark Hillick (8)

Peeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security OnionPeeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security Onion
 
Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDB
 
PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)
 
Integrated Cache on Netscaler
Integrated Cache on NetscalerIntegrated Cache on Netscaler
Integrated Cache on Netscaler
 
Scareware Traversing the World via Ireland
Scareware Traversing the World via IrelandScareware Traversing the World via Ireland
Scareware Traversing the World via Ireland
 
Implementing a WAF
Implementing a WAFImplementing a WAF
Implementing a WAF
 
CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!
 
MongoDB - Who, What & Where!
MongoDB - Who, What & Where!MongoDB - Who, What & Where!
MongoDB - Who, What & Where!
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

HackEire 2009

  • 1. HackEire 2009 by @markofu http://www.hackeire.net @hackeire
  • 2. Aim of this Presentation Ø Provide overview of how we compromised this Environment. Ø Note this is not the only way that you can compromise this environment. Ø There may be a number of methods that could result in the same compromise of Data. HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 2
  • 3. The Scope Ø The ‘Bhratach’ company has requested a full Black-Box test. Ø This presence is hosted within the company and is connected to the company's internal corporate LAN. Ø Testing consists of the external DMZ and Internal LAN. Ø Use any tools that you legally own to test this network. Ø Identify any vulnerabilities with this environment? HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 3
  • 4. The Reconnaissance Ø Identify the Network. Ø The tools that we used for Reconnaissance: §  NMAP §  Nessus HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 4
  • 5. NMAP Ø Use NMAP –sP 10.0.1.0/23 HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 5
  • 6. NMAP Nmap –sT –vv –A 10.0.1.25 DNS Server HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 6
  • 7. NMAP Nmap –sT –vv –A 10.0.1.40 SMTP Server HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 7
  • 8. NMAP Nmap –sT –vv –A 10.0.1.50 Web Server HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 8
  • 9. Nessus Nessus Output Web Server HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 9
  • 10. 10.0.1.25 DNS Server Zone Transfer & then ‘nmap –vv –A –iL ips.txt’ HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 10
  • 11. 10.0.1.25 DNS Server Enum –u 10.0.1.25 HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 11
  • 12. 10.0.1.25 Brute force the smb accounts Hydra –t 1 –w 0 –l Lyray –p 1234 10.0.1.25 smbnt HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 12
  • 13. 10.0.1.25 Identify any potential Buffer Overflow Server vulnerable to MS 08-067 exploit HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 13
  • 14. 10.0.1.25 Exploiting the Buffer Overflow Server vulnerable to MS 08-067 exploit HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 14
  • 15. 10.0.1.25 Get shell & transfer netcat via ftp HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 15
  • 16. 10.0.1.25 Transfer ‘pwdump’ HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 16
  • 17. 10.0.1.25 Extract new tools J HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 17
  • 18. 10.0.1.25 Setting up netcat persistent Listener With a shell J HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 18
  • 19. 10.0.1.25 Connect via Netcat from Attacker system HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 19
  • 20. 10.0.1.25 Through netcat, now on 10.0.1.25 (see LHS) HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 20
  • 21. 10.0.1.25 Dumping the password file HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 21
  • 22. 10.0.1.25 Transferring the password dump HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 22
  • 23. 10.0.1.25 And the keyrings….. HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 23
  • 24. 10.0.1.25 Use ‘John’ on the Password Dump HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 24
  • 25. 10.0.1.40 Using compromised Lyray account SSH to 3456 using username Lyray password 1234 HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 25
  • 26. 10.0.1.40 Identify the Linux Kernel Use this to identify if there are vulnerabilities with the Kernel HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 26
  • 27. 10.0.1.40 Look for the word exploit These have been left lying around by a careless sysadmin who was testing a patch HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 27
  • 28. 10.0.1.40 Identify the exploit directory These have been installed by a previous attacker via the FTP protocol. HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 28
  • 29. 10.0.1.40 Run the exploit These have been installed by a previous attacker via the FTP protocol. HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 29
  • 30. 10.0.1.40 FTP to your attacker system HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 30
  • 31. 10.0.1.40 Upload the flags Using FTP upload the Flags or you may use SCP over port 3456 (more secure) HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 31
  • 32. 10.0.1.40 Grab the Password Files Using FTP upload the passwd and shadow file HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 32
  • 33. 10.0.1.40 Get the ‘willy’ password Using John ‘unshadow’ the merged password file. HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 33
  • 34. 10.0.1.50 View the front page and source code HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 34
  • 35. 10.0.1.50 Nmap show ‘webadmin’ up…what’s there? Look for the shell directory on port 10000 HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 35
  • 36. 10.0.1.50 Connect to the Website Enumerate the directories HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 36
  • 37. 10.0.1.50 Shell vulnerability…. Create a User & SSH on as that user HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 37
  • 38. 10.0.1.50 Or use Metatron to SSH Cd & ‘ls -la’ the directories HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 38
  • 39. 10.0.1.50 Transfer the flags - e.g. Winscp HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 39
  • 40. 10.0.1.50 ifconfig -a 4th flag & ‘pii’ file must be on 10.0.2.75 HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 40
  • 41. 10.0.1.50 Identify the fourth server Use arp to get all connected servers HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 41
  • 42. 10.0.1.50 Port scan with netcat SQL back-end? What’s 3333? SMB, netbios – transfer files? HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 42
  • 43. 10.0.1.50 Tcpdump shows something also…. HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 43
  • 44. 10.0.1.50 As root - ‘crontab -l’ Looks interesting…… HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 44
  • 45. 10.0.1.50 Ps auwx |grep asriel Looks interesting…… HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 45
  • 46. 10.0.2.75 Identify shares on 10.0.2.75 Use a ‘valid’ account to enumerate HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 46
  • 47. 10.0.2.75 Connecting via Asriel Share…. Transfer the keyrings to 10.0.1.50 & from there to system via scp HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 47
  • 48. 10.0.2.75 Asriel Share? Transfer the keyrings to 10.0.1.50 & from there to system via scp HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 48
  • 49. 10.0.2.75 Temp Share…remember ‘Competitor Pack’ Transfer the keyrings to 10.0.1.50 & from there to system via scp HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 49
  • 50. 10.0.2.75 Transferring final flag to 10.0.1.50…. HackEire -2009 19/11/2009 Copyright © 2009 IRISS www.irissie 50
  • 55. Who is Andrew Wiles? Fermat s Last Theorem x^n + y^n ≠ z^n where n is integer >2 & x,y,z Ε Ζ