350 likes | 670 Views
Introduction to Reconnaissance. Information gathering Social engineering Physical break-in Dumpster diving Scanning Modems/Wireless Access Points Hosts Network hardware Services Vulnerabilities. Reconnaissance – Step 1.
E N D
Introduction to Reconnaissance • Information gathering • Social engineering • Physical break-in • Dumpster diving • Scanning • Modems/Wireless Access Points • Hosts • Network hardware • Services • Vulnerabilities
Reconnaissance – Step 1 • Information gathering – investigate the target using publicly-available information • Analogy: a bank robber “casing the joint” • Visit the bank • Note times employees (especially security guard) arrive and leave • Note location of security cameras, guards, safe, etc. • Determine make and model of alarm system and safe; Research them • Plan the robbery • Plan getaway route
Information Gathering • Prior to launching an attack, skilled computer attackers often try to learn as much as possible about: • The systems and networks they plan to attack • Hardware and software • Topology • Typical operation • Owners, users, and administrators
Tools for Information Gathering • The Web • Target organization’s web site may contain: • Employee contact information and phone numbers • Business partners • Technologies in use • Other information about the target: • Search engines • Customers and business partners • Whois databases • ARIN • DNS servers
Goals of Information Gathering • Determine: • What is available to steal/deface/shutdown? • What avenue of attack is most likely to succeed? • What are the chances of getting caught? • Etc.
Social Engineering • Deceiving people into revealing sensitive/useful information • May be attempted: • In person or remotely (e.g. phone, e-mail, etc.) • Once or over a period of time • Can result in: • Sensitive information • Unauthorized access • Passwords • Etc.
Social Engineering from The Master • The Art of Deception by Kevin Mitnick
Social Engineering - Examples • A “new employee” calls the help desk to get help with a particular task • An “angry manager” calls a lower-level employee because the manager’s password has suddenly stopped working • An “administrator” calls an employee because there is something wrong with the employee’s account • An “employee” in the field calls to get a remote access phone number
Defenses Against Social Engineering • Policies • Information that should never be divulged over the phone • Procedures for maintenance, password resets, etc. • User education
Social Engineering Examples • Lottery Tickets • Inheritance from Africa • I Love You Virus • Disk Space Over Quota • Bank Account Suspicious Activity • Bank Account updating system
Physical Break-ins • An attacker might show up at an organization and attempt to: • Physically access computer systems • Install malicious hardware or software • Steal sensitive documents, storage media, or a computer system • Etc.
Defenses Against Physical Break-ins • Policy • Locks • Alarms • Badges • Guards • User education
Dumpster Diving • What might an attacker be able to find by going through the trash? • Old versions of sensitive documents or e-mail • Discarded disks, tapes, and other media • Post-it note with a username and password • Etc.
Defenses Against Dumpster Diving • Policy • Paper shredders • Media cleansers • Special trash cans for sensitive material • User education
Reconnaissance – Step 2 • Scanning – many tools are available to automate the search for: • Modems • Hosts • Network hardware • Services • Vulnerabilities
War Dialers • Obtain a range of phone numbers used by the target organization • Phone book • Web • Social engineering • A war dialer is a program that will dial each number and record whether or not a modem answers
War Dialers (cont) • Once modems are found: • Nudging – send characters to modem and note the reply (hopefully a banner) • Look for modems which do not require passwords • For those that do require passwords, try some guesses • Finding modems can be very valuable: • Can give remote (sometimes privileged) access to networks and systems • PCanywhere, LapLink, ControlIT • Completely bypass Internet gateways and firewalls
Modem Exploitation • http://seclists.org/pen-test/2001/Sep/233 • http://www.blackhat.com/presentations/bh-usa-09/TRAMMELL/BHUSA09-TrammellDruid-MetasploitTele-PAPER.pdf
Defenses Against War Dialers • Policies • Who can have a modem? • How will it be secured? • How can employees remotely access their systems? • Periodic checks for compliance • User education
WarDriving/WarBiking/WarWalking • Search for accessible wireless networks • Examples: • Kismet (http://www.kismetwireless.net/ ) • NetStumbler (http://www.stumbler.net/ ) • Defenses • Policy • Periodic compliance checks • User education
Reconnaissance - Summary • Information gathering • Social engineering • Physical break-in • Dumpster diving • Scanning • Modems • Wireless Access Points • User Education!