1. Trang chủ
  2. » Công Nghệ Thông Tin

HACKING EXPOSED: NETWORK SECURITY SECRETS & SOLUTIONS SECOND EDITION pptx

36 348 1
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Hacking Exposed: Network Security Secrets & Solutions
Tác giả Stuart McClure, Joel Scambray, George Kurtz
Chuyên ngành Network Security
Thể loại Book
Năm xuất bản 2005
Thành phố New York
Định dạng
Số trang 36
Dung lượng 389,08 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

HACKING EXPOSEDFIFTH EDITION: NETWORK SECURITY SECRETS & SOLUTIONS... Hacking Exposed™ Fifth Edition: Network Security Secrets & Solutions Copyright © 2005 by Stuart McClure, Joel Scambr

Trang 1

HACKING EXPOSED

FIFTH EDITION: NETWORK SECURITY SECRETS & SOLUTIONS

Trang 2

2100 Powell Street, 10th Floor

Emeryville, California 94608

U.S.A

To arrange bulk purchase discounts for sales promotions, premiums, or fund-raisers,

please contact McGraw-Hill/Osborne at the above address For information on

transla-tions or book distributors outside the U.S.A., please see the International Contact Information page immediately following the index of this book

Hacking Exposed™ Fifth Edition: Network Security Secrets & Solutions

Copyright © 2005 by Stuart McClure, Joel Scambray, and George Kurtz All rights served Printed in the United States of America Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or

re-by any means, or stored in a database or retrieval system, without the prior written mission of publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication

Composition and Illustration

Apollo Publishing Services

Series Design

Dick Schwartz & Peter F Hancik

Cover Series Design

Dodie Shoemaker

This book was composed with Adobe® InDesign® CS

Information has been obtained by McGraw-Hill/Osborne from sources believed to be reliable However, because of the sibility of human or mechanical error by our sources, McGraw-Hill/Osborne, or others, McGraw-Hill/Osborne does not

pos-guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information.

Trang 3

For those who have volunteered to fi ght

on behalf of America—thanks.

Joel

To my loving wife, Anna, and my son, Alex, who provide inspiration, guidance, and unwavering support To my mom, for helping me defi ne my character and teaching me to overcome adversity.

George

Trang 4

iv Hacking Exposed: Network Security Secrets & Solutions

ABOUT THE AUTHORS

Stuart McClure

Stuart McClure is senior vice president of risk management product development at McAfee, Inc., where he is responsible for driving prod-uct strategy and marketing for the McAfee Foundstone family of risk mitigation and management solutions McAfee Foundstone saves countless millions in revenue and hours annually in recovering from hacker attacks, viruses, worms, and malware Prior to his role at McAfee, Stuart was founder, president, and chief technology offi cer of Found-stone, Inc., which was acquired by McAfee in October 2004

Widely recognized for his extensive and in-depth knowledge of security products, Stuart is considered one of the industry’s leading authorities in information security to-day A published and acclaimed security visionary, he brings many years of technology and executive leadership to McAfee Foundstone, along with profound technical, opera-tional, and fi nancial experience At Foundstone, Stuart leads both product vision and strategy, and holds operational responsibilities for all technology development, support, and implementation During his tenure, annual revenues grew over 100 percent every year since the company’s inception in 1999

In 1999, he took the lead in authoring Hacking Exposed: Network Security Secrets &

So-lutions, the best-selling computer-security book ever, with over 500,000 copies sold to

date Stuart also coauthored Hacking Exposed: Windows 2000 (McGraw-Hill/Osborne, 2001) and Web Hacking: Attacks and Defense (Addison-Wesley, 2002).

Prior to Foundstone, Stuart held a variety of leadership positions in security and IT management, with Ernst & Young’s National Security Profi ling Team, two years as an industry analyst with InfoWorld’s Test Center, fi ve years as director of IT with both state and local California governments, two years as owner of an IT consultancy, and two years in IT with the University of Colorado, Boulder

Stuart holds a bachelor’s degree in psychology and philosophy, with an emphasis in computer science applications, from the University of Colorado, Boulder He later earned numerous certifi cations, including ISC2’s CISSP, Novell’s CNE, and Check Point’s CCSE

Joel Scambray

Joel Scambray is a senior director in Microsoft Corporation’s MSN curity group, where he faces daily the full brunt of the Internet’s most notorious denizens, from spammers to Slammer He is most widely rec-

Se-ognized as coauthor of Hacking Exposed: Network Security Secrets &

Solutions, the internationally best-selling Internet security book, as well

as related titles on Windows and web application security

Before joining Microsoft in August 2002, Joel helped launch security services startup Foundstone, Inc., to a highly regarded position in the industry, and he previously held positions as a manager for Ernst & Young, security col-

umnist for Microsoft TechNet, editor at large for InfoWorld Magazine, and director of IT

Trang 5

for a major commercial real estate fi rm He has spoken widely on information security to organizations including CERT, the Computer Security Institute (CSI), ISSA, ISACA, SANS, private corporations, and government agencies, including the FBI and the RCMP Joel has maintained CISSP accreditation since 1999.

Joel Scambray can be reached at joel@webhackingexposed.com

George Kurtz

George Kurtz is senior vice president of risk management at McAfee, Inc., where he is responsible for the roadmap and product strategy for the McAfee Foundstone portfolio of risk management and mitigation solutions to protect IT infrastructures and to optimize business avail-ability Prior to his role at McAfee, George was CEO of Foundstone, Inc., which was acquired by McAfee in October 2004

With his combination of business savvy and technical know-how, George charted Foundstone’s strategic course, positioning the company

as a premier “pure play” security solutions provider George cofounded Foundstone in

1999, and his vision and entrepreneurial spirit helped attract a world-class management team to join him in building one of the most successful and dominant private security companies During his tenure as chief executive offi cer at Foundstone, George success-fully raised over $20 million in venture capital and was responsible for consummating several international strategic partnerships as well as the sale of Foundstone to McAfee

in 2004 He was nationally recognized as one of Fast Company’s Fast 50 leaders, ogy innovators, and pioneers, and was regionally named 2003 Software Entrepreneur of the Year by the Southern California Software Industry Council

technol-Prior to cofounding Foundstone, George served as a senior manager and the tional leader of Ernst & Young’s Security Profi ling Services Group Prior to joining Ernst

na-& Young, George was a manager at PricewaterhouseCoopers, where he was responsible for the development of their Internet security testing methodologies used worldwide

As an internationally recognized security expert and entrepreneur, George is a quent speaker at major industry conferences and has been quoted and featured in many

fre-top publications and media programs, including the Wall Street Journal, Time, the Los

Angeles Times, USA Today, and CNN He coauthored the best-selling Hacking Exposed: Network Security Secrets & Solutions as well as Hacking Linux Exposed (McGraw-Hill/Os-

borne, 2002), and he contributes regularly to leading industry publications

George holds several industry designations, including Certifi ed Information Systems Security Professional (CISSP), Certifi ed Information Systems Auditor (CISA), and Certi-

fi ed Public Accountant (CPA) George graduated with honors from Seton Hall University, where he received a bachelor of science in accounting

About the Contributing Authors

Stephan Barnes is currently in charge of consulting sales for Foundstone Professional

Services, a Division of McAfee, and is a recognized name in the information security dustry Although his security experience spans 20 years, Stephan’s primary expertise is

Trang 6

in-vi Hacking Exposed: Network Security Secrets & Solutions

in war-dialing, modems, PBX, and voicemail system security All of these technologies are a critical addition to evaluating an external security posture of any modern enter-prise Stephan’s industry expertise includes working for a military contractor and the DoD, and his consulting experience spans hundreds of penetration engagements for

fi nancial, telecommunications, insurance, manufacturing, distribution, utilities, and high- tech companies Stephan is a frequent speaker at many security-related conferences and organizations He has gone by the alias M4phr1k for over 20 years and has maintained his personal website on war-dialing and other related topics at http://www.m4phr1k.com

Michael Davis is currently a research scientist at Foundstone, Inc He is also an

ac-tive developer and deployer of intrusion detection systems, with contributions to the Snort Intrusion Detection System Michael is also a member of the Honeynet project, where he is working to develop data and network control mechanisms for Windows-based honeynets

Nicolas Fischbach is a senior manager in charge of the European Network Security

Engineering team at COLT Telecom, a leading pan-European provider of end-to-end business communications services He holds an engineer degree in networking and distributed computing, and is a recognized authority on service provider infrastructure security and DoS-attack mitigation Nicolas is cofounder of Sécurité.Org, a French-speaking portal on computer and network security; of eXperts and mystique, an informal security research group and think tank; and of the French chapter of the Honeynet project He has presented at numerous technical and security conferences, teaches networking and secu-rity courses at various universities and engineering schools, and is a regular contributor

to the French security magazine MISC More details and contact information are on his

homepage, http://www.securite.org/nico

James C Foster (CISSP, CCSE) is the Manager of FASL Research & Development and

Threat Intelligence for Foundstone Inc As such, he leads a team of research and ment engineers whose mission is to create advanced security algorithms to check for local and network-based vulnerabilities for the FoundScan product suite Prior to joining Foundstone, James was a senior consultant and research scientist with Guardent, Inc.,

develop-and an adjunct author for Information Security Magazine, subsequent to working as an

information security and research specialist at Computer Sciences Corporation James has also been a contributing author in other major book publications A seasoned speak-

er, James has presented throughout North America at conferences, technology forums, security summits, and research symposiums, with highlights at the Microsoft Security Summit, MIT Wireless Research Forum, SANS, and MilCon He also is commonly asked

to comment on pertinent security issues and has been cited in USA Today, Information

Security Magazine, Baseline, Computer World, Secure Computing, and the MIT Technologist.

Bryce Galbraith is a senior hacking instructor and codeveloper of Foundstone’s

“Ul-timate Hacking: Hands On” series Since joining Foundstone’s team, Bryce has taught the art of professional hacking to well over 1000 students from a “who’s who” of top companies, fi nancial institutions, and government agencies from around the globe He has also taught at Black Hat conferences Bryce consistently receives the highest ratings

from course attendees and is often requested by name by various organizations He has

been involved with information technologies for over 20 years with a keen focus on the

Trang 7

security arena Prior to joining Foundstone, Bryce founded his own security company offering a variety of security-related services Before this, he worked with major Internet backbone providers as well as other critical infrastructure companies, as designated by the FBI’s National Infrastructure Protection Center (NIPC), providing a wide variety of

security-related services Bryce is a member of several security professional

organiza-tions and is a Certifi ed Information System Security Professional (CISSP) and a Certifi ed Ethical Hacker (CEH)

Michael Howard is the coauthor of the best-selling title Writing Secure Code (Microsoft

Press, 2002), now in its second edition, and 19 Deadly Sins of Software Security:

Program-ming Flaws and How to Fix Them (McGraw-Hill/Osborne, 2005) He is the senior program

manager of the Secure Windows Initiative at Microsoft, where he works on secure neering discipline, process improvement, and building software for humans to use He works with hundreds of people both inside and outside the company each year to help them secure their applications Michael is a prominent speaker at numerous conferences,

engi-including Microsoft’s TechEd and the PDC He is also a coauthor of Processes to Produce

Secure Software, published by the Department of Homeland Security, National Cyber

Security Michael is a Certifi ed Information System Security Professional (CISSP)

About the Tech Reviewer

Anthony Bettini leads the McAfee Foundstone R&D team His professional security

experience comes from working for companies like Foundstone, Guardent, and Bindview, and from independent contracting He specializes in Windows security and vulnerabil-ity detection, and programs in Assembly, C, and various scripting languages Tony has spoken publicly at NIST’s NISSC in the greater Washington, DC, area on new anti-tracing techniques and has spoken privately for numerous Fortune 500 companies For Found-stone, Tony has published new vulnerabilities found in PGP, ISS Scanner, Microsoft Windows XP, and Winamp

Trang 8

AT A GLANCE

Part I Casing the Establishment

1 Footprinting 5

2 Scanning 41

3 Enumeration 77

Part II System Hacking 4 Hacking Windows 139

5 Hacking UNIX 211

6 Remote Connectivity and VoIP Hacking 293

Part III Network Hacking 7 Network Devices 351

8 Wireless Hacking 407

9 Firewalls 463

10 Denial of Service Attacks 487

Part IV Software Hacking 11 Hacking Code 511

12 Web Hacking 535

13 Hacking the Internet User 573

Trang 9

Part V Appendixes

A Ports 651

B Top 14 Security Vulnerabilities 657 Index 659

Trang 10

CONTENTS

Foreword xvii

Acknowledgments xix

Introduction xxi

Part I Casing the Establishment Case Study: Googling Your Way to Insecurity 2

1 Footprinting 5

What Is Footprinting? 6

Why Is Footprinting Necessary? 6

Internet Footprinting 8

Step 1: Determine the Scope of Your Activities 8

Step 2: Get Proper Authorization 8

Step 3: Publicly Available Information 8

Step 4: WHOIS & DNS Enumeration 18

Step 5: DNS Interrogation 32

Step 6: Network Reconnaissance 37

Summary 40

2 Scanning 41

Determining If the System Is Alive 42

Determining Which Services Are Running or Listening 51

Scan Types 52

Identifying TCP and UDP Services Running 54

Windows-Based Port Scanners 60

Port Scanning Breakdown 66

Detecting the Operating System 68

Active Stack Fingerprinting 69

Passive Stack Fingerprinting 73

Summary 76

Trang 11

3 Enumeration 77

Basic Banner Grabbing 79

Enumerating Common Network Services 81

Summary 133

Part II System Hacking Case Study: I Have a Mac—I Must Be Secure! 136

4 Hacking Windows 139

Overview 141

What’s Not Covered 142

Unauthenticated Attacks 142

Proprietary Windows Networking Protocol Attacks 143

Windows Internet Service Implementations 165

Authenticated Attacks 173

Privilege Escalation 173

Pilfering 175

Remote Control and Back Doors 186

Port Redirection 190

General Countermeasures to Authenticated Compromise 192

Covering Tracks 196

Windows Security Features 199

Keeping Up with Patches 199

Group Policy 200

IPSec 202

runas 203

.NET Framework 204

Windows Firewall 205

The Encrypting File System (EFS) 205

Windows XP Service Pack 2 206

Coda: The Burden of Windows Security 208

Summary 209

5 Hacking UNIX 211

The Quest for Root 212

A Brief Review 212

Vulnerability Mapping 213

Remote Access vs Local Access 213

Remote Access 214

Data-Driven Attacks 218

I Want My Shell 230

Common Types of Remote Attacks 235

Trang 12

Contents xiii

Local Access 261

After Hacking Root 276

Rootkit Recovery 289

Summary 290

6 Remote Connectivity and VoIP Hacking 293

Preparing to Dial Up 294

War-Dialing 296

Hardware 296

Legal Issues 297

Peripheral Costs 298

Software 298

Brute-force Scripting—The Homegrown Way 313

PBX Hacking 325

Voicemail Hacking 329

Virtual Private Network (VPN) Hacking 335

Voice over IP Attacks 339

Most Common Attacks 340

Summary 345

Part III Network Hacking Case Study: Wireless Insecurities 348

7 Network Devices 351

Discovery 352

Detection 352

Autonomous System Lookup 356

Normal traceroute 357

traceroute with ASN Information 357

show ip bgp 358

Public Newsgroups 359

Service Detection 360

Network Vulnerability 365

OSI Layer 1 366

OSI Layer 2 368

Switch Sniffi ng 369

OSI Layer 3 381

dsniff 383

Misconfi gurations 386

Route Protocol Hacking 393

Management Protocol Hacking 404

Summary 405

Trang 13

8 Wireless Hacking 407

Wireless Footprinting 408

Equipment 409

Wireless Scanning and Enumeration 425

Wireless Sniffers 426

Wireless Monitoring Tools 430

Identifying Wireless Network Defenses and Countermeasures 437

SSID 438

MAC Access Control 440

Gaining Access (Hacking 802.11) 442

MAC Access Control 444

Attacks Against the WEP Algorithm 446

Securing WEP 447

Tools That Exploit WEP Weaknesses 448

LEAP Attacks 453

Denial of Service (DoS) Attacks 456

An 802.1x Overview 457

Additional Resources 458

Summary 460

9 Firewalls 463

Firewall Landscape 464

Firewall Identifi cation 465

Advanced Firewall Discovery 469

Scanning Through Firewalls 472

Packet Filtering 477

Application Proxy Vulnerabilities 480

WinGate Vulnerabilities 482

Summary 484

10 Denial of Service Attacks 487

Common DoS Attack Techniques 489

Old-School DoS: Vulnerabilities 490

Modern DoS: Capacity Depletion 491

DoS Countermeasures 498

A Quick Note on Practical Goals 498

Resisting DoS 499

Detecting DoS 503

Responding to DoS 504

Summary 507

Trang 14

Contents xv

Part IV Software Hacking

Case Study: Only the Elite… 510

11 Hacking Code 511

Common Exploit Techniques 512

Buffer Overfl ows and Design Flaws 512

Input Validation Attacks 518

Common Countermeasures 523

People: Changing the Culture 523

Process: Security in the Development Lifecycle (SDL) 524

Technology 532

Recommended Further Reading 533

Summary 534

12 Web Hacking 535

Web Server Hacking 536

Sample Files 538

Source Code Disclosure 539

Canonicalization Attacks 539

Server Extensions 540

Buffer Overfl ows 542

Web Server Vulnerability Scanners 544

Web Application Hacking 546

Finding Vulnerable Web Apps with Google 546

Web Crawling 547

Web Application Assessment 549

Common Web Application Vulnerabilities 561

Summary 572

13 Hacking the Internet User 573

Internet Client Vulnerabilities 574

A Brief History of Internet Client Hacking 575

JavaScript and Active Scripting 579

Cookies 580

Cross-Site Scripting (XSS) 581

Cross-Frame/Domain Vulnerabilities 582

SSL Attacks 583

Payloads and Drop Points 586

E-mail Hacking 587

Instant Messaging (IM) 591

Microsoft Internet Client Exploits and Countermeasures 592

General Microsoft Client-Side Countermeasures 600

Trang 15

Why Not Use Non-Microsoft Clients? 613

Non-Microsoft Internet Clients 615

Online Services 619

Socio-Technical Attacks: Phishing and Identity Theft 623

Phishing Techniques 624

Annoying and Deceptive Software: Spyware, Adware, and Spam 628

Common Insertion Techniques 629

Blocking, Detecting, and Cleaning Annoying and Deceptive Software 630

Malware 634

Malware Variants and Common Techniques 634

Detecting and Cleaning Malware 642

Physical Security for End Users 646

Summary 647

Part V Appendixes A Ports 651

B Top 14 Security Vulnerabilities 657

Index 659

Trang 16

FOREWORD

The Internet is a fragile ecosystem There is no guarantee the good guys will win As

an executive at a global security fi rm, I have seen Nimda, Blaster, and Fun Love wash over organizations like a blitzkrieg The fi rst critical hours of those attacks are a chaotic swirl, as security experts struggle to crack the code When the attack begins, corporate security and vendor research teams scramble Every conceivable communica-tions channel crackles with news from those who are safe and colleagues whose networks have been hit

For those of us at the center of the storm, the process is simultaneously exciting and

a bit frightening In the fi rst critical minutes, everyone wonders if this will be the one that

we couldn’t stop Yet in all the attacks so far, the tide has turned in a few hours, and the attention shifts to cleaning up the mess and thwarting the inevitable copycat variants Within a week, the security team does a fi nal debrief, goes out for a beer, and fi nally gets some well-earned sleep

So far, the good guys have won every contest, and the war seems to be going in our

direction The nontechnical business executives I work with are becoming used to

win-ning these cyber-skirmishes They have faith in their security teams and are spending basketfuls of money on them Extrapolating the past success seems natural—why shouldn’t we keep “winning”? Occasionally, however, one of the more thoughtful execu-tives will ask, “What should I tell our board’s audit committee about the risks in the future? Can we continue to keep the damage to a minimum?”

I sometimes refer these execs to the analytical paper “How to Own the Internet in Your Spare Time,” by Weaver, Paxson, and Staniford That paper concludes: “Better en-gineered worms could spread in minutes or even tens of seconds rather than hours, and could be controlled, modifi ed, and maintained indefi nitely, posing an ongoing threat of use in attack on a variety of sites and infrastructures.” The candid answer to the board’s audit committee is, “We don’t really know The skill and organization of the bad guys is increasing at a alarming rate The best we can do is understand the risk in detail and make sure the investment we make really reduces the risk.”

Confronted with this sobering reality, the next question is typically, “So what are the most important things I can do to keep winning?” As a vendor exec, I clamp down on my parochial desire to peddle the latest technology gizmo and give them the only proven

Trang 17

answer: Invest in your technical staff and understand what it is really worth to you to keep the various parts of your business functioning.

This book addresses the fi rst need and prepares for the second Understanding the

potential mechanisms of attack is critical, and Hacking Exposed, Fifth Edition is the

au-thoritative reference The range of potential vulnerabilities and attacks is humbling Even students of earlier editions will fi nd critical new insight on the more modern attacks I suggest to technical managers that a disciplined skills development program with this type of content, reinforced by group discussion and application to your environment, is important to do at least yearly

For the business managers paying for the books and the students’ time, my mendation is that they challenge the technical teams to stretch incredibly The technical teams need to understand the full spectrum, from vulnerabilities to attack mechanism,

recom-to the vulnerability “map” of the organizations they protect, recom-to the specifi c business

val-ue of the assets protected When all of these factors are brought together, an organization can start to manage its risks in a way that can be explained in the boardroom and actu-ally withstand daily pounding from competent attackers I know of no other IT technical specialty that requires such a broad range of technical knowledge and range of knowl-edge of value and structure of a business

Modern security technology, especially intrusion prevention, can help immensely in defense Without a disciplined and well-supported set of policies and processes, it’s im-possible to respond as needed in the “moment of truth.” But megabucks of technology and volumes of policy and procedure are worthless without a solid foundation in peo-ple, and trained security experts are clearly the cornerstone of that foundation

To my knowledge, there has been no loss of life or damage to heath from cyberattacks

to date But, the ecosystem grows every day In a few years, voice conversations will be VoIP based and will travel over the Internet As core infrastructure systems in power generation and transportation modernize, they ironically face increasing risk through planned or inadvertent connection to the ‘Net Soon, the call you place to 911 for help or the heat on a cold winter’s night could depend on Internet availability

Clearly, the stakes are rising If you want to ensure you have the technical skills and

the business vision to keep your organization safe, keep reading Hacking Exposed, Fifth

Edition It’s the fi rst and most necessary step to ensuring that every day, as a global

secu-rity team, we keep winning

Gene Hodges President, McAfee Inc.

Trang 18

ACKNOWLEDGMENTS

First, we would like to sincerely thank our incredibly intelligent and gracious

col-leagues at Foundstone for their help Their tireless efforts in contributing to this

fi fth edition and the guidance through this book will never be overlooked Thanks also to colleagues at Microsoft, including the crews at MSN Security, SBTU, TwC, Corpo-rate Security, PSS, Offi ce, and all the rest who’ve helped ride herd on those cats and provided inspiration daily

Big thanks must also go to the tireless McGraw-Hill/Osborne editors and production staff who worked on this edition, including Jane Brownlow, Emily Wolman, LeeAnn Pickrell, James Kussow, and Jessica Wilson

And fi nally, a tremendous “Thank You” to all the readers of the fi rst, second, third, and fourth editions Your never-ending support has risen the topic of security to the light of day and exposed the techniques of hackers to those who most desperately need them

Ngày đăng: 28/03/2014, 20:20

TỪ KHÓA LIÊN QUAN

w