Eksamen Flashcards
Bli klar!
What kind of services do we have to face from outside a network?
Web, Ftp, ssh, dns, mail (SMTP, POP3, IMAP, Exchange), VPN and many others
What kind of services do we have to face from inside a network?
Netbios, SMB, Printer, RDP, DB services, LDAP, etc.
What kind of errors (vulnerabilities) can we expect?
Configuration related errors & Software vulnerability related error
Give examples of Configuration related errors
– Default credentials
– Easy to guess credentials (we had information gathering before)
– No or inappropriate protection against guessing (brute-force)
– Unnecessary function
– Privilege misconfigurations
– Other configuration errors
Give examples of Software vulnerability related error
– No input validation
– Memory handling errors
– Several others (see later)
What are you looking for when you start compromising and firstly use in the service in a normal way?
– Is there any information disclosure?
– Error messages, etc.
– Restrictions
Give examples of ways to force a service to error and obtain information
– Provide invalid data
– Use it in an invalid way
What are the 5 other ways to start compromising?
- Try factory defaults
- Brute-forcing
- Search for known exploits
- Service specific exploitations
- Unique ways
What is brute forcing?
• Trying out multiple combinations
• How to generate the options? – Random
– Trying out all combinations – Using a list or dictionary
What are som brute forcing tools?
– THC Hydra (ssh, ftp, http)
Hydra was created by a hacker group The Hacker’s choice. It is an universal brute-force tool that can be used for several protocols.
– Ncrack – Medusa
What is an exploit?
An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service (DoS or related DDoS) attack.
What are some ways of attacking a FTP service?
The ftp server configuration file declares what is enabled.
If anonymous is enabled, we can log in to see what we can do We can also brute-force the credentials or use exploits
What is SMTP?
(Simple Message Transfer Protocol) is a standard for email transmission in widespread today.
What are the main SMTP commands?
HELO: Sent by a client to identify itself
EHLO: The same as HELO but with ESMTP (multimedia support)
MAIL FROM: Identifies the sender of the message
RCPT TO: Identifies the message recipients
DATA: Sent by a client to initiate the transfer of message content
Note there are no Subject, CC, BCC fields. All these data are placed in the data section (these are not part of the smtp)
VRFY: Verifies that a mailbox is available for message delivery. If it’s allowed user enumeration is possible.
When attacking SMTP, what is open relay access?
In case of open-relay settings, the user doesn’t need to provide credentials. Anyone can send a mail with arbitrary fields. DEMO..