Lecture 4 Systemhacking
Lecture 4 Systemhacking
vulnerabilities
and penetration
testing
Dr Phillip James
Last week we considered enumeration, a form of
Recap and targeted information gathering.
today
Hence, so far, we have only obtained information
(all be it a lot, and all very important)
Get password:
Hiding: § Brute
§ Root kits force/dictionary/rainbow
§ Clear tracks/log files § Eavesdropping
Execute Apps:
§ Key loggers
Escalate privileges:
§ Backdoors
§ Vulnerabilities
§ Trojans/spyware
§ Horizontal/Vertical
Approaches • Obtaining and cracking passwords.
we will explore
• Accessing networks.
%SystemRoot%/system32/config/SAM
(Security account manager).
Linux shadows
https://github.com/magnumripper/JohnTheRipper
• IP addresses
• Vendor/product information for access points.
• Information on default (perhaps random) netwrok
keys.
• Possibly mac adresses.
Notice:
• MIC verification is how AP checks the validity of PTK (and,
consequently, the password).
• Chances of a password producing PTK that is valid (relevant
part) is really low: 2-128.
Overall, 4-way password "cracking" works like this:
The crack
1. 4-way handshake is parsed to get AP and STA
addresses, AP and STA nonces, and MIC.
2. Candidate password is used to compute PMK;
3. PTK is computed from PMK, AP and STA
addresses and nonces;
4. PTK is used (with other parts) to compute MIC.
5. Computed MIC is compared to the MIC
obtained at step 1. If they match then candidate
password is reported as correct.
sudo airport –s
Demo (scan for routers/bssid’s/channels)
Files:
Normal.exe
x.exe
Software
Win Root-
makes API
call API kit
Infected PC
Files:
Normal.exe
User-Mode
User-Mode rootkits are given administrative privileges on the computer they run
Types on. They are able to modify any files and resources and will start whenever the
computer boots.
Kernel-Mode
Rootkits running in kernel mode run at the same level as the operating system.
Apologies for the wall of text. Kernel level rootkits disguise themselves by interrupting system calls and returning
expected information concealing their presence.
User/Kernel Hybrid
Hybrid rootkits attempt to combine above. This style of rootkit in one of the most
common in existence currently.
Firmware Level
Hidden in firmware. Able to reinstall themselves on booting. Certain hard disk
rootkits have been found that are capable of reinstalling themselves after a
complete system formatting and installation.
A very famous Sony made headlines in late 2005!
them Behavioural-based
Looking for rootkit-like behaviour. For example, differences in
the timing and frequency of API calls. (complex!)
Signature-based
Signature-based detection methods can be effective against
well-published rootkits (but root-kits may kill your AV).
Integrity Checking
Code signing uses public-key infrastructure to check if a file
has been modified since being digitally signed by its publisher.
(on every call?)