Học viện Công Nghệ Thông Tin Bach Khoa Enumerating User Accounts SMTP and DNS Enumeration SNMP Enumeration Enumeration Countermeasures... Học viện Công Nghệ Thông Tin Bach Khoa names,
Trang 2
THE US National Weather Service computer network was hacked with a group from Kosovo claiming credit and posting sensitive data, security experts said Friday
Data released by the Kosovo Hackers Security group includes directory structures, sensitive files
of the Web server and other data that could enable later access, according to Chrysostomos Daniel of the security firm Acunetix
“The hacker group stated that the attack is a protest against the US policies that target Muslim countries," Daniel said
“Moreover, the attack was a payback for hacker attacks against nuclear plants in Muslim countries, according to a member of the hacking group who said, "They hack our nuclear plants using STUXNET and FLAME-like malwares, they are bombing us 24-7, we can't sit silent hack
to payback them." http://www.theaustralian.com.au
Copyright © by All Rights Reserved Reproduction is Strictly Prohibited
Trang 3Học viện Công Nghệ Thông Tin Bach Khoa
Enumerating User Accounts SMTP and DNS Enumeration
SNMP Enumeration Enumeration Countermeasures
Trang 5Học viện Công Nghệ Thông Tin Bach Khoa
names, network resources, shares, and services from a system Enumeration techniques are conducted in an
Types of information
Enumerated by intruders:
SPORE EEE EEE eC OOP w * 6 `6 eee eee eee eee
Network resources and
shares
ˆ na
Copyright © by FÊ-Ceuacd
All Rights Reserved Reproduction ts Strictly Protubited
Trang 6Extract user names using SNMP
Extract user groups from Windows
Copynght © by Ef-Ceuncal All Rights Reserved Reproduction ts Strictly Prohebtte‹i
Trang 8ws Bk ACAD
Enumeration
Attackers use the NetBios enumeration to obtain:
1 List of computers that belong to s domain
2 List of shares on the individual hosts on the network
TCP 53 | TCP 135 | TCP 137 |
UDP 139 |
TCP 445 | UDP 161 |
Trang 9MAL &therer ‘ TwIovs Mock et etiesn setwice nae / wt 2 ater WOO c?ccrp, Mork»w*x' 19% 4v (174 heme
Trang 10to: 192.168.168.135 wat ~ Fibe Server Service
Works? ation Service
Trang 12
ey
é
Passwords
default password list
might still be enabled with a “default password”
systems Using Default
Trang 14Học viện Công Nghệ Thông Tin Bach Khoa
(Simple Network Management Protocol)
Enumeration
F—] SNMP enumeration uses these default community strings to extract information about a
Copyright © by Ef-Leuncal
All Rights Reserved Reproduction ts Strictly Prohabited
Trang 15
MIB is a virtual database containing formal description of all the network
objects that can be managed using SNMP
The MIB database is hierarchical and each managed object in a MIB is addressed through object identifiers (OID)
MIB managed objects include scalar objects that define a single object instance and tabular objects that define group of related object instances
The OID includes the object's type such as counter, string, or address, access
level such as read or read/write, size restrictions, and range information
SNMP manager uses the MIB as a codebook for translating the OID numbers into a human-readable display
Copyright © by
All Rights Reserved Reproduction ts Strictly Prohebited
Trang 16Học viện Công Nghệ Thông Tin Bach Khoa
SNMP Enumeration Tool: OpUtils
Network Monitoring Toolset
Trang 17
7
SNIMIP Enumeration Tool:
File Edt Nodes MIBs Decovery Submet Yew Help
Services Accounts
= Administrator Gue et
tUSP *QOY
©\ tưAn soy
linkage Roy
> Shares + Hub ports
Subnet Scan Completed
Trang 18Học viện Công Nghệ Thông Tin Bach Khoa
~ Nsauditor Network Securit
Trang 20Học viện Công Nghệ Thông Tin Bach Khoa
Enumeration
Commands used to enumerate UNIX network resources are as follows:
1 Enumerates the user and the host
2 Enables you to view the user’s home directory,
1 Finds the shared directories ’ : : y
~~
~
>> —
1 Using rpcchent we can enumerate 2, RPC protocol allows applications
usernames on Linux and OS X to communicate over the network [root $] rpcclient $> netshareenum [root] rpcinfo —p 19x.16x.xxx.xx
Copyright © by Ef-Ceancal
All Rights Reserved Reproduction ts Strictly Protwubited
Trang 21Học viện Công Nghệ Thông Tin Bach Khoa
sh-3.2$ cnus4linax.p1 -rx 192.168.255 Starting enum4linux v0.8.2 ( http abs portcullis.co.uk/application/ enum=4 linux ) on Wed Apr 2 14:14:35 20 Target information
Domain Name: WORKCROUP Linux Enumeration
Doeain Sid: $-0-0
*! | Ho iont 1 : part par of é a workgroup 1O (not not œ4 đo øwmw1 a domain) Tool:
Session Check on 192.168.2.55 + Server 192.168.2.55 allows sessions using username * Ppa=sword
Users on 197.168.2.55 via RID cycling (CRIDS SDO-S5! 1000-1050)
I) Assuming that user “administrator” exists
S~-1-5-21-1801674531-1482476501-725345343-301 W2KSQOL\Guest (CLocal User)
S~1-5-21~-18016745831-14824676501-725345543-1000 W2KSOL\TsInternetUser (Local User) S-1-5-71-1801674531-1482476501 -725345543-1001L WZKSOL\IUSR_PORTCULLIS (Local User
S-1-5-21-1801674531-1482476501 25345543-1002 W2ZKSQOL\ IMAM PORTCULLIS «Local User)
S-1-5-21-14016745311-1432476501-725345543-1004 W2KSQL\&ark (locai User) s~-1-5-21-18013674511-1442476501-7253455S413-1005 W2KSQL\vbliahn CLocal User) S-1-5-21-1801674531-1482476501-725345543-1006 W2ZKSOL\basic (Local User) cnmumélinux complete on Wed Apr 2 14:14:40 20608
http://labs_portcullis.co.uk
Copyright © by Ef -Ceuncal All Rights Reserved Reproduction ts Strictly Prohututed
Trang 23Học viện Công Nghệ Thông Tin Bach Khoa
The Lightweight Directory Access Protocol is a protocol used to access the directory listings within
A directory is compiled ina |
, like the levels of management and
employees in a company
it tends to be tied into the [ to allow the integrated quick lookups and fast
resolution of queries
it runs on and tends to confirm to a distinct
set of rules Request for comments (RFC's) like other
protocols
All Rights Reserved Reproduction ts Strictly Protwbited.
Trang 24^ +* - olector
` T} Perey vwM w‹
} hen PA/ñ2+ 14S:
Xetrvnr VNOCEN Mew MACKENMIE
Pheto:
Cemmen Meme: b asta Smemcess
omege WA Geven Name:
Trang 25Học viện Công Nghệ Thông Tin Bach Khoa
SN g LDAP Account Manager Lord) LDAP Explorer Tool
~ ~ễ httn://wwwwv Ídap-œccourrt-rraanogecr.org v—» httpa://kÍaptool sourccforgc.net
Trang 27Học viện Công Nghệ Thông Tin Bach Khoa
NTP
, is designed NTP can maintain time to within
to synchronize clocks of networked over the public Internet
@ lItcan achieve accuracies of; ‹ or
it uses as its primary means better in local area networks under ideal
Trang 29EE SNTP Tiere Sonar Bint Ei Mere inhouse GPS receiver, and offer time services
GPS / Rado Ck
Tok Mad Aden
a PReterence Tene Souece
“M7? P ae mad
Foam Acktecs
» Serve NTP Vee mon P et
` SMTP Sewe
“se xa S ` ~Te=‹m 2nd Rederdaers Serve Maxexsz~ Pod irmer~a
_ Use bert mote
oft me ect rep oor’ đeẹectb
CIEH © › ® Copyrght © ty EB-Đauaci!
Trang 30Học viện Công Nghệ Thông Tin Bach Khoa
Enumeration Tools
Trang 33
Học viện Công Nghệ Thông Tin Bach Khoa
W ek cxe — —_ a - - - — = —uaaaamn m—
> putomated SMTP Email Generator and Relay Test Use tres tool to sex test can messages wth Str K
- san Teck SMTP serwers tor open refeys wtheet sereteg creat worry 17 comenon retiey tests
T oote |
— ———-—————-—————ẽ
—
@ Pocket Grew eo ores SAM CORN
“~~ Packet Viewer
Poet Scare
+ REC Reference <j Message Setters
" Your Serving Doren Nere
Goda Test Settings pur “se x6 c7!
*®% LR Cacture
Wưak—n-L A04 P 24X 3 1? Wew Rests nm Web frosweser
View Log + de View @eaw« as “ext
>
Cre
http://www netscantools.com
All Rights Reserved, Reproduction is Strictly Prob 5 ted
Trang 35Học viện Công Nghệ Thông Tin Bach Khoa
DNS Zone Transfer Enumeration
Using
itis a process of locating the DONS server and the records of a target network
» An attacker can valuable network information such as DNS server names, hostnames, machine
names, user names, etc
W Ina DONS zone transfer enumeration, an attacker tries to a copy of the entire zone file fora
domain from a DNS server
Copyright © by FE-Ceuœcd All Rights Reserved Reproduction ts Strictly Prohibited
Trang 36Học viện Công Nghệ Thông Tin Bach Khoa
IPAM Anatyzing &
Management Management Monitoring
Trang 38implement the Group Policy security option called “Additional restrictions for anonymous connections”
Access to null session pipes, null
session shares, and IPSec filtering
should also be restricted
Ensure that HINFO and other records
Provide standard network
administration contact details
to prevent social engineering and war dialing attacks
Copyright © by E-Ceuncal All Rights Reserved Reproduction ts Strictly Prohebited
Trang 39these types of information:
— Details of ' being used (such as Sendmail o MIS Exchange)
s or host information
by configuring SMTP servers
Trang 40check boxes, and click
Mp Reatek RTLS169/81 10 Fant Gosb
T her oormecthon uses the fofowens fer
fortron
~~) Show on 7 nothoeton aes when corrected iw] Not@y mre when Ges Comection hes leeted of no Compmectivey
j ' ' | Lace
Copyright © by Ef -Ceunca
Ajl ?tphex Reservedli ftocporociuctfon 1x Str«tly Ðroh4eb(tte‹i
Trang 42Học viện Công Nghệ Thông Tin Bach Khoa
Enumeration
connections to systems and directed queries The information can be
Trang 43Học viện Công Nghệ Thông Tin Bach Khoa
: = in order to enumerate important servers, tind the network range using
Y tools such as Whols Lookup and Graphical DNS Zones
- > many of the ping sweep and port scamming tools by using tools such 4s
subnet ma sk SubnéetMask Calculator
: = Find the servers connected ta the Internet using tools such as Nmap
v = Perform port scanning to check for the open ports on the noces using
tools such as nmap
Use tools such as Undergo host
-+ ->> & Perform ONS crumeration using tcols such as nslookup and the Men
(nmap discovery & Mice Suite
< R -F >>
network aS ) ; = Perform NetBiCS enumeration using tools such es SuperScan, NetBios
v Crumerator, and PsTools suite
Use tools such as Perform port i‘
Trang 44Học viện Công Nghệ Thông Tin Bach Khoa
Perform TV ie , Use tools such as OpuUtils
@ Perform SNMP enumeration using tools
such as‘ ; Network | i " :
© Perform NTP enumeration using tools
such as ntpdate, ntptrace, ntpdc
© Perform SMTP enumeration using tools Perform NTP Use commands such
such as Super Webscan and | eS as ntpdate, ntptrace,
|; ntpdc, ntpq
yYYY) Document all the Perform SMTP Use tools such as Super
Email Collector
Copyright © by Ef-Ceuncal
All Rights Reserved Reproduction ts Strictly Prohibited
Trang 45network resources, shares, and services from a system
«ẴÌ Simple Network Management Protocol (SNMP) is a TCP/IP protocol used for remote
monitoring and managing hosts, routers, and other devices on a network
— MIB provides a standard representation of the SNMP agent’s available information and
where it is stored
— The Lightweight Directory Access Protocol (LDAP) is a protocol used to access the
directory listings within Active Directory or from other directory services
L Network Time Protocol (NTP) is designed to synchronize clocks of networked computers
Copyright © by Ef-feunca All Rights Reserved Reproduction ts Strictly Protututed