Chapter 6 Enumeration Flashcards
Phase 3: Enumeration
process of extracting info from target in an organized and methodical manner by initiating active connections (may be crossing legal boundaries)
Info includes:
- strengths & weaknesses of system;
- NW resources & shares
- Users & groups
- routing tables
- machine names
- apps & banners
- SNMP & DNS details
- ARP tables
- traffic stats
Enumeration Techniques
1) Extracting info from Email IDs
2) Obtaining info through Default PWs
3) Using Brute-force attacks on Directory Services
4) Exploiting SNMP
5) Working w/ DNS Zone Transfers
6) Capturing User Groups
1) Extracting info from Email IDs
used to obtain username & domain name info
e-mail address contains two parts, the first before @ is username, and after @ is the domain
2) Obtaining info through Default PWs
every device has default settings in place
3) Using Brute-force attacks on Directory Services
a directory service is a DB that contains info used to administer the NW; many directories are vulnerable to input verification deficiencies that may be exploited in discovering & compromising user accounts
4) Exploiting SNMP
The Simple NW Mgmt Protocol can be exploited by an attacker who can guess the strings & use them to extract usernames
5) Working with DNS Zone Transfers
Zone transfer in DNS is used to synchronize server info; contains info that could map the NW
info could fall into wrong hands
6) Capturing Users Groups
extract user accounts from specified groups, storing the results, & determining whether the session accounts are in the group
Windows
designed to be used as either stand-alone or in networked environment; the following will be assumed for NW setup only
Define users
Processes in Windows are run under one of the following user contexts:
Users are most responsible for controlling access to the system
1) Local Service - user account w/ high than normal access to the local system but only limited access to the NW
2) NW service - A user account w/ normal access to the NW but only limited access to the local system
3) System - A super-user style account that has nearly unlimited access to the local system
4) Current User - The currently logged-in user, who can run applications & tasks but is still subject to restrictions that other users are not subject to. The restrictions on this account hold true even if the user account being used is an Admin account
Groups
Default Groups in Windows:
groups are used to simplify mgmt; they are effective admin tools that enable mgmt of multiple users;
1) Anonymous Logon Designed - to allow anonymous access to resources; typically used when accessing a web server or web applications
2) Batch - used to allow batch jobs to run schedule tasks, such as a nightly cleanup job that deletes temporary files
3) Creator Group - Windows 2000 uses this group to automatically grant access permissions to users who are members of the same group(s) as the creator of a file
4) Creator Owner - the person who created the file is a member of this group. Windows 2000 & later uses this group to automatically grant access permissions to the creator of the file
5) Everyone - All users are members of this group; This group is used to give wide access to a system resource
6) Interactive - any user logged on to the local system has the Interactive identity, which allows only local users to access a resource
7) Network - Any user accessing the system through a NW has the NW identity, which allows only remote users to access a resource
8) Restricted Users & computers with restricted capabilities have the restricted identity. On a member server or workstation, a local user who is a member of the Users group (rather than the Power Users group) has this identity.
9) Self- refers to the object & allows the object to modify itself
10) Service - any service accessing the system has the Service identity, which grants access to processes run
11) System - The OS has the System identity, which is used when the OS needs to perform a system-level function
12) Terminal Server User - allows Terminal Server users to access Terminal Server applications & to perform other necessary tasks w/ terminal services
Security Identifiers (SID)
Each user account in windows has an SID (S-1-3-43-4993949…) Even though you use a username to access the system, Windows identifies each user, group, or object by the SID. Windows uses the SID to match passwords and check permissions
Services & ports of interest for Enumeration phase:
1) TCP 53
2) TCP 135
3) TCP 137
4) TCP 139
5) TCP 445
6) UDP 161 and 162
7) TCP/UDP 389
8) UCP/UDP 3368
9) TCP 25
1) TCP 53
Used for DNS Zone Transfers; DNS system keeps servers up to date w/ latest Zone data
2) TCP 135
communications between client-server apps, such as Microsoft Outlook to communicate w/ Microsoft Exchange
3) TCP 137
associated w/ NetBIOS Name Service (NBNS) is designed to provide name resolution services involving the NetBIOS protocol;
The service allows NetBIOS to associate names & IP addresses of individuals systems & services; This service is a natural & easy target for many attackers
4) TCP 139
NetBIOS Session Service, aka SMB over NetBIOS; management of connections between NetBIOS-enabled clients & apps; service is used by NetBIOS to establish connections & tear them down when they are no longer needed
5) TCP 445
SMB over TCP
6) UDP 161 and 162
SNMP is a protocol used to manage & monitor NW devices & hosts; The protocol is designed to facilitate messsaging, monitoring, auditing, & other capabilities;
Listening takes place on 161 & traps are received on 162