Eti Unit6
Eti Unit6
Eti Unit6
There are thousands of possible network vulnerabilities, equally as many tools, and
even more testing techniques. We don’t need to test our network for every possible
vulnerability, using every tool available.
We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with the latest vendor software and firmware patches. We can eliminate
many other vulnerabilities by following some security best practices on our network.
6.1.2 Network Infrastructure Vulnerabilities
Network infrastructure vulnerabilities are the foundation for all technical security
issues in your information systems. These lower-level vulnerabilities affect everything
running on your network. That’s why you need to test for them and eliminate them
whenever possible.
Your focus for ethical hacking tests on your network infrastructure should be to find
weaknesses that others can see in your network so you can quantify your level of
exposure.
Many issues are related to the security of your network infrastructure. Some issues are
more technical and require you to use various tools to access them properly. You can
access others with a good pair of eyes and some logical thinking. Some issues are
easy to see from outside the network, and others are easier to detect from inside your
network.
Network infrastructure security involves accessing such areas as
Where such devices as a firewall or IDS (Intrusion Detection System) are placed
on the network and how they are configured.
What hackers see when they performed port scans and how they can exploit
vulnerabilities in your network hosts.
Network design, such as internet connections, remote-access capabilities, layered
defences, and placements of hosts on the network.
Interaction of installed security devices
Protocols in use.
Commonly attacked ports that are unprotected.
Network hosts configuration.
Network monitoring and maintenance.
If any of these network security issue is exploited, such things can happen:
A DoS attack can take down your internet connection or even your entire network.
A hacker using a network analyser can steal confidential information in e-mails
and files being transferred.
Backdoors into your network can be setup.
Specific hosts can be attacked by exploiting local vulnerabilities across the
network.
Always remember to do the following:
Test your systems from both the outside in and the inside out.
Obtain permission from partner networks that are connected to your network to
check for vulnerabilities on their ends that can affect your network’s security,
such as open ports and lack of a firewall or a misconfigured router.
6.1.3 Scanning-Ports
A port scanner is a software tool that basically scans the network to see who’s there.
Port scanners provide basic views of how the network is laid out. They can help
identify unauthorized hosts or applications and network host configuration errors that
can cause serious security vulnerabilities.
The big-picture view from port scanners often uncovers security issues that may
otherwise unnoticed. Port scanners are easy to use and can test systems regardless of
what operating systems and applications they’re running. The tests can be performed
very quickly without having to touch individual network hosts, which would be a real
pain otherwise.
Port-scan tests take time. The length of time depends on the number of hosts you
have, the number of ports you scan, the tools you see, and the speed of your network
links. Also, perform the same tests with the different utilities to see whether you get
different results. Not all tools find the same open ports and vulnerabilities. This is
unfortunate, but it’s a reality of ethical hacking tests.
If your results don’t match after you run the tests using different tools, you may want
to explore the issue further. If something doesn’t look right such as a strange set of
open ports it probably isn’t. Test it again; if you’re in doubt, use another tool for a
different perspective.
As an ethical hacker, you should scan all 65,535 UDP and 65,535 TCP ports on each
network host that’s found by your scanner. If you find questionable ports, look for
documentation that the application is known and authorized. For speed and simplicity
, you can scan commonly hacked ports.
For the sake of security, if banners are not a requirement of business or other software on
a host system, the services that provide them may be disabled altogether. Banners scan
can also be customized to present disinformation or even a warning message for hackers.
Banners are the welcome screen that divulge software version numbers and other hosts
information to a network hosts. This banner information may identify the operating
system, the version number, and the specific service packs, so hackers know possible
vulnerabilities. You can grab banners by using either plain old telnet or Netcat.
Telnet
You can telnet to hosts on the default telnet port (TCP port 23) to see whether you are
presented with a login prompt or any other information.
Just enter the following line at the command prompt in windows and unix:
telnet ip_address
Netcat
Netcat can grab banners information from router and other network hosts such as, a
wireless access point or managed Ethernet switch.
Counter Measures (Banner Grabbing)
The following steps can reduce the chance of banner-grabbing attacks:
- If there is no business need for services that offer banner information, disable those
unused services on the network host.
- If there is no business need for the default banners, or if you can customized the banners
displayed, configure the network host’s application or operating system to either disable
the banners or remove information from the banners that could give an attacker a leg upn.
6.1.7 Analysing Network Data and Network Analyzer
A network analyzer is a tool that allows you to look into a network and analyse data
going across the wire for network optimization, security, and/or troubleshooting purposes.
Like a microscope for a lab scientist, a network analyser is a must-have tool for any
security professional.
Network analyzers are often generically referred to as sniffers, though that’s actually the
name and trademark of specific product from Network Associates, Sniffers (the original
network-analysis tool).
When assessing security and responding to security incidents, a network analyser can
help you.
View anomalous network traffic and even track down an intruder.
Develop a baseline of network activity and performance before a security incident
occurs, such as protocols in use, usage trends, and MAC addresses.
A Network analyser is just software running on a computer with a network card. It works
by placing the network card in promiscuous mode, which enables the card to see all the
traffic on a network, even traffic not destined to the network-analyser host.
The network analyser performs the following functions:
Capture all network traffic.
Interprets or decode what is found into a human-readable format.
Displays it all in chronological order.
Here are a few caveats for using a network analyser:
To capture all traffic, you must connect the analyser to either a hub on the
network.
A monitor/span/mirror port on a switch
What’s entering your network before the firewall filters eliminates the junk traffic.
What’s leaving your network after the traffic goes past the firewall.
When your network behaves erratically, a network analyser can help you in
Track and isolate malicious network usage.
Detect malicious Trojan-horse applications.
Monitor and track downs DoS attacks.
Different network analysing tools are:
Sr Name of Network Analyser Supporting Operating System
No.
1 EtherPeek by WildPackets Windows
2 Ethereal Windows and Unix
3 Ettercap Windows and Unix
4 Dsniff Unix
Wireless LAN
A wireless LAN (or WLAN) is one in which a mobile user can connect to a local area
network (LAN) through a wireless (radio) connection. The IEEE 802.11 group of
standards specify the technologies for wireless LANs 802.11 standards use the Ethernet
Protocol and CSMA/CA (carrier sense multiple access with collision avoidance) for path
sharing and include an encryption method, the Wire Equivalent Privacy algorithm.
Implications of Wireless Network Vulnerabilities
WLANs are very susceptible to hacker attacks even more so than wired networks are.
They have vulnerabilities that can allow a hacker to bring your network to its knees and
allow your information to be gleaned right out of thin air.
If a hacker comprises your WLAN, you can experience the following problems:
1. Loss of network access, including e-mail, Web, and other services that can
cause business downtime.
2. Loss of confidential information, including passwords, customer data,
intellectual property, and more.
3. Legal liabilities associated with unauthorized users.
Most of the wireless vulnerabilities are in the 802.11 protocol and within wireless access
points the central hub like devices that allow wireless clients to connect to the network.
Wireless clients have some vulnerability as well.
Various fixes have come along in recent years to address these vulnerabilities, but most of
these fixes have not been applied or are not enabled by default.
You may also have employees installing rogue WLAN equipment on your network
without your knowledge; this is the most serious threat to your wireless security and a
difficult one to fight off, Even when WLANs are hardened and all the latest patches have
been applied, you still may have some serious security problems, such as DoS and man-
in-the-middle attacks (like you have on wired networks), that will likely be around for a
while.
Common Wireless Threats
- There are a number of main threats that exists to wireless LANs, this include:
Rogue access Points/Ad-Hoc Networks
Denial of Service
Configuration problems (Mis Configurations/Incomplete Configurations )
Passive Capturing
Wi-Fi networks can be vulnerable to a variety of difficult attacks. Because of this, it’s
important to be aware of them so you can take the necessary steps to prevent and reduce
their impact.
Different kinds of attacks are Encrypted traffic, Rogue networks, Physical security
problems, vulnerable wireless workstations, Default configuration settings.
Encrypted traffic
- Wireless traffic can be captured directly out of the airwaves, making this communications
medium susceptible to malicious eavesdropping.
- Unless the traffic is encrypted, it’s sent and received in clear text just like on a standard
wired network.
- On top of that, the 802.11 encryption protocol, Wired Equivalent Privacy (WEP), has its
own weakness that allows hackers to crack the encryption keys and decrypt the captured
traffic.
Rogue Networks
- Watch out for unauthorized Access Points and wireless clients attached to your network
that are running in ad-hoc mode.
- Using NetStumbler or your client manager software, you can test for Access Points that
don’t belong on your network.
- You can also use the network monitoring features in a WLAN analyzer such as AiroPeek.
- Walk around your building or campus to perform this test to see what you can find.
- Physically look for devices that don’t belong a well-placed Access Point or WLAN client
that’s turned off won’t show up in your network analysis tools.
- Search near the outskirts of the building or near any publicly accessible areas.
- Scope out boardrooms and the offices of upper level managers for any unauthorized
devices. These are places that are typically off limits but often are used as locations for
hackers to set up rogue Access Points.
Physical-security problems
- Various physical-security vulnerabilities can result in physical theft, the reconfiguration
of wireless devices, and the capturing of confidential information.
- You should look for the security vulnerabilities when testing your systems such as Access
Points mounted on the outside of a building and accessible to the public, Poorly mounted
antennas or the wrong types of antennas that broadcast too strong a signal and that are
accessible to the public.
- You can view the signal strength in NetStumbler or your wireless client manager.
Vulnerable wireless workstations
- Wireless workstations have tons of security vulnerabilities from weak passwords to
unpatched security holes to the storage of WEP (Wired Equivalent Privacy) leys locally.
- One serious vulnerability is for wireless clients using the Orinoco wireless card.
- The Orinoco Client Manager software stores encrypted WEP keys in the Windows
Registry even for multiple networks.
Default configuration settings
- Similar wireless workstations, wireless Access Points have many known vulnerabilities.
- The most common ones are default SSIDs(Service Set Identifier) and admin passwords.
The more specific ones occurs only on certain hardware and software versions that are
posted in vulnerability databases and vendor Web sites.
- The one vulnerability that stands out above all others is that certain Access Points,
including Linksys, D-Link and more, are susceptible to a vulnerability that exposes and
WEP key(s), MAC (Media Access Control) address filters, and even the admin password!
All that hackers have to do to exploit this is to send a broadcast packet on UDP port
27155 with a string of gstsearch.
An operating system is a program that acts as an interface between the software and the
computer hardware. It is an integrated set of specialized programs used to manage overall
resources and operations of the computer. It is specialized software that controls and
monitors the execution of all other programs that reside in the computer, including
application programs and other system software. Many operating systems are available
now days.
Many securities flaws in the headlines aren’t new. They’re variants of vulnerabilities that
have been around for a long time in UNIX and LINUX, such as the Remote Procedure
Call vulnerabilities that the Blaster worm used.
You’ve heard the saying “the more things change, the more they stay the same.”
That applies here, too
Most Windows attacks are prevented if the patches were properly applied. Thus, poor
security management is often the real reason.
Windows
If security vulnerabilities aren’t addressed and managed properly, they can bring a
network or an entire organization to its knees.
When Windows and other Microsoft software are attacked especially by a
widespread internet-based worm or virus hundreds of thousands of organizations
and millions of computers are affected.
Many well-known attacks against Windows can lead to.
- Leakage of confidential information, including files being copied and credit card
numbers being stolen.
- Passwords being cracked and used to carry out other attacks.
- Systems taken completely offline by DoS attacks.
- Entire databases being corrupted or deleted when insecure Windows-based systems
are attacked, serious things can happen to a tremendous number of computers around
the world.
- Autoplay feature came in Windows XP. This feature checks removable media/devices
then identifies and launches appropriate application based on its contents. This feature
is useful for authentic users but is a gateway for an attacker.
- Clipboard vulnerability can allow attacker to get access to the sensitive clipboard
data. In windows clipboard is common for all applications. This may lead to access
and modification in the clipboard of all applications in the operating system.
- MS-Windows stores its configuration settings and options in a hierarchical database
which is known as windows Registry. Registry is used for low level operating system
setting and for settings of applications running on the platform.
LINUX
It is the latest flavour of UNIX that has really taken off in corporate networks.
It is the competitor Operating System for Microsoft.
A common misunderstanding is that Windows is the most insecure operating
system. However, Linux and most of its sister variant of UNIX are prone to the
same security vulnerabilities as any other operating system.
Hackers are attacking Linux because of its popularity and growing usage in
today’s network environment, because some versions of Linux are free.
Many organizations are installing Linux for their Web servers and e-mail servers
in expectations of saving money.
Linux has grown in popularity for other reasons, including the following:
- Ample resources available, including books, Web sites, and consultant expertise.
- Perception that Linux is more secure than Windows.
- Unlikeliness that Linux will get hit with as many viruses (not necessarily worms) as
Windows and its applications do. This is an area where Linux excels when it comes to
security, but it probably won’t stay that way.
- Increased buy-in from other UNIX vendors, including IBM and Sun Micro systems.
- Growing ease of use.
Linux Vulnerabilities
Vulnerabilities and hacker attacks against Linux are affecting a growing number
of organizations especially e-commerce companies and ISPs that rely on Linux for
many of their systems.
When Linux systems are hacked, the victim organizations can experience the
same side effects as if they were running Windows, including:
- Leakage of confidential intellectual property and customer information.
- Passwords being cracked.
- Systems taken completely offline by DoS attacks.
- Corrupted or deleted databases.
Messaging System Messaging systems are those e-mail and instant messaging (IM)
applications that we depend on are often hacked within a network. Why? Because messaging
software both at the server and client level is vulnerable because network administrators
forget about securing these systems, believe that antivirus software is all that's needed to keep
trouble away, and ignore the existing security vulnerabilities.
A. Storage Overload
- Multiple large messages can quickly fill the total storage capacity of an email server.
If the messages aren’t automatically deleted by the server or manually deleted by
individual user accounts, the server will be unable to receive new messages.
- This can create a serious DOS problem for your email system, either crashing it or
requiring you take your email system of line to clean up the junk that has
accumulated. Eg. 100 MB file attachment sent 10 times to 80 users can take 80GB of
storage space.
B. Bandwidth Blocking
- An attacker can crash your email service or bring it to a crawl by filling the
incoming internet connections with junk. Even if your system automatically
identifies and discards obvious attachments attacks, the bogus messages eat
resources and delay processing of valid messages.
- Limit the size of either e-mails or e-mail attachment. Check for this options in e-
mail server configuration options, e-mail content filtering, and e-mail clients. This
is the best protection against attachment overloading.
- Limit each user’s on the server. This denies large attachments from being written
to disk. Limit message sizes for inbound and even outbound messages if you want
to prevent a user from launching this attack inside your network.
2. Connection Attack
A hacker can send a huge amount of e-mails simultaneously to addresses on your
network.
These connection attacks can cause the server to give up on servicing any inbound or
outbound TCP requests.
This can lead to a complete server lockup or a crash, often resulting in a condition
where the attacker is allowed administrator or root access to the system!
This attack is often carried out as spam attack.
Many e-mail servers allow you to limit the number of resources used for inbound
connections.
It can be impossible to completely stop an unlimited amount of inbound requests.
However, you can minimize the impact of the attack. This setting limits the amount of
server processor time, which can help prevent a DoS attack.
Even in large companies, there’s no reason that thousands of inbound e-mail delivers
should be necessary within a short time period.
3. Autoresponders Attack
This is an interesting attack to find two or more users on the same or different e-
mail systems that have autoresponder configured.
Autoresponder is that annoying automatic e-mail response you often get back from
random users when you are subscribing to mailing list.
A message goes to the mailing list of subscribers and then users have their e-mail
configured to automatically respond back, saying they’re out of the office or, on
vacation.
An autoresponder attack is a pretty easy hack.
Many unsuspecting users and e-mail administrators never know what hit them!
The hacker sends each of the two (or more) users an e-mail from the simply by
masquerading as that
This attack can create a never-ending loop that bounces thousands of messages back
and forth between users.
This can create a DoS condition by filling either the user’s individual disks space
quota on the e-mail server or the e-mail server’s entire disk space.
Countermeasures (Banners)
Following are some banner security tips for SMTP, POP3, and IMAP servers:
Use of right software can neutralize many threats such as – Use malware protection
software on the e-mail server better, Apply the latest operating system and e-mail
application security patches consistently.
Use of encrypted messages or messaging system.
Put your e-mail server behind a firewall, preferably in a DMZ that’s on a different
network segment from the internet and from your internal LAN.
Disable unused protocols and services on your e-mail server.
Run your e-mail server on a dedicated server, if possible, to help keep hackers out of
other servers and information if the server is hacked.
Log all transactions with the server in case you need to investigate malicious use in
the future.
If your server doesn’t need e-mail services running (SMTP, POP3, and IMAP)
disable them immediately.
Email monitoring can detect and block messages sent from compromised accounts.
Email filtering can block certain types of attacks that are known to carry malicious
content.
Secure email client configurations can also reduce the risk of malicious email.
Checking to see if the email address of a questionable message matches the reply-to
email address.
Verifying that URLs in an email go to legitimate websites.
Web applications, like e-mail are common hacker targets because they are everywhere
and often open for anyone to poke around in.
Basic Web sites used for marketing, contact information, document downloads and so on
are a common target for hackers especially the script-kiddie’s types to deface.
However, for criminal hackers, Web sites that store valuable information, like credit-card
and Social Security numbers, are especially attractive.
Why are Web applications so vulnerable? The general consent is they’re vulnerable
because of poor software development and testing practices. Sound familiar? It should,
because this is the name problem that affects operating systems and practically all
computer systems.
This is the side effect of relaying on software compilers to perform error checking, lack of
user demand for higher-quality software and emphasizing time-to-market instead of
security and stability.
Web application Vulnerabilities
Hacker attacks against insecure Web applications via Hypertext Transfer Protocol
(HTTP) make up the majority of all Internet-related attacks.
Most of these attacks can be carried out even if the HTTP traffic is encrypted (via HTTPS
or HTTP over SSL) because the communications medium has nothing to do with these
attacks.
The security vulnerabilities actually lie within either the Web applications themselves or
the Web server and browser software that the applications run on and communicate with.
Many attacks against Web applications are just minor nuisances or may not affect
confidential information or system availability.
However, some attacks can cause destruction on your systems. Whether the Web attack is
against a basic brochure ware site or against the company’s most critical customer server,
these attacks can hurt your organization.
Some other web application security vulnerabilities are as follows
SQL Injection
Security Misconfiguration
- Security Configuration must be defined and deployed for the application, frameworks,
application server, web server, database server, and platform. If these for the application ,
are properly configured , an attacker can have unauthorized access to sensitive data or
functionality.
- Sometimes such flaws result in complete system compromise. Keeping the software up to
date is also good security
Directory Traversals
A directory traversal is a really basic attack , but it can turn up interesting information
about a Web site .
This attack is basically browsing a site and looking for clues about the server ' s directory
structure
Properly controlling access to web content is crucial for running a secure web server.
Directory traversal or Path Traversal is an HTTP attack which allows attackers to access
restricted directories and execute commands outside of the web server's root directory.
Web servers provide two main levels of security mechanisms
Root directory
- The root directory is the top - most directory on the server file System.
- User access is confined to the root directory , meaning users are unable to access
directories or files outside of the root
There are two main countermeasures to having files compromised via Malicious directory
traversals :
o Don't store old , sensitive , or otherwise nonpublic files on your web server.
- The only files that should be in your / htdocs or Document Root folder are those that are
needed for the site to function properly.
- These files should not contain confidential information that you don ' t want the world to
see.
o Ensure that your Web server is properly configured to allow public access only to those
directories that are needed for the site to function.
- Minimum necessary privileges are key here , so provide access only to the bare minimum
files and directories needed for the Web application to perform properly.
Database management systems are nearly as complex as the operating systems on which
they reside .
As a security professional , there is need to assess and manage any potential security
problems
Following are the Vulnerabilities in database management systems
Loose access permissions. Like applications and operating systems , database
management systems have schemes of access controls that are often designed far too
loosely , which permits more access to critical and sensitive information than is
appropriate . This can also include failures to implement cryptography as an access
control when appropriate.
Excessive retention of sensitive data. Keeping sensitive data longer than necessary
increases the impact of a security breach.
Aggregation of personally identifiable information. The practice known as
aggregation of data about citizens is a potentially risky undertaking that can result in
an organization possessing sensitive personal information. Sometimes, this happens
when an organization deposits historic data from various sources into a data
warehouse, where this disparate sensitive data is brought together for the first time .
The result is a gold mine or a time bomb , depending on how you look at it.
While some attackers still focus on denial of service attacks , cyber criminals often
target the database because that is where the money is.
The databases that power web sites hold a great deal of profitable information for
someone looking to steal credit card information or personal identities
Database security on its own is an extremely in - depth copic that could never be
covered in the course of one article : however there are a few best practices that can
help even the smallest of businesses secure their database enough to make an attacker
move on to an easier target.
Use a WAF
- Keep patches current. This is one area where administrators often come up short.
- Web sites that are rich with third-party applications, widgets, components and various
other plug-ins and add-ons can easily find themselves a target to an exploit that should
have been patched.
- Avoid using a shared web server if your database holds sensitive information.
- While it may be easier, and cheaper, to host your site with a hosting provider you are
essentially placing the security of your information in the hands of someone else.
- If you have no other choice, make sure to review their security policies and speak with
them about what their responsibilities are should your data become compromised.
- Keep in mind that securing your database means you have to shift your focus from web
developer to database administrator. In small businesses, this may mean added
responsibilities and additional buy in from management.
- However, getting everyone on the same page when it comes to security can make a
difference between preventing an attack and responding to an attack.
References:
1. Hacking for Dummies (5th Edition), Kevin Beaver CISSP, Wiley Publishing Inc.
ISBN: 978-81-265-6554-2
2. CISSP for Dummies(5th Edition). Lawrence C. Miller, Peter H. Gregory, ISBN: 978-
1-119-21023-8
3. http://www.applicure.com/blog/database-security-best-practice
4. https://thecybersecurityplace.com/database-hacking-its-prevention
5. https://www.valencynetworks.com/blogs/cyber-attacks-explained-database-hacking
6. https://www.acunetix.com/websitesecurity/directory-traversal
7. https://www.veracode.com/security/directory-traversal