Module 4 - Website Attacks Flashcards

1
Q

What makes websites vulnerable

A
  • designed for public access
  • inbound requests (80 and 443) expected. Firewalls allow requests
  • intrusions may give access to corporate lan or internet
    (potential for misconfiguration)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Website vulnerable for following reasons

A
  • misconfigurations (directory browsing, enumeration of parent paths, enabling writes)
  • elevated permissions of service account
  • unnecessary services running on web server, such as FTP or SMTP
  • unnecessary components, such as ASP, .NET, cgi
  • 3rd party content mgmt servers with own set of vulns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intrusion Techniques (outcomes) (4)

A
  • Executable code (upload) and visit - server executes
  • modify site’s content (deface or subtle to affect result)
  • directory browsing and traversals (better foothold)
  • view parent paths
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Website Misconfigurations

A
  • unused open ports - may create entry points
  • incorrect read/write access - attacker could utilize
  • hosting service or account may have escalated privileges
  • web site’s content hosted on same drive as OS
  • file listing, directory reads, enumeration
  • unused services (SMTP, FTP, ASP, scripting) WebDAV, CGI, ASP
  • error messages (attackers may utilize)
  • IIS - some allow for navigating
  • FTP site may be same as web site
  • IIS account may have elevated permissions (web service account)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Web Server Logs (4)

A
  • server log
  • web site log
  • firewall
  • IDS
  • servers without detailed logging make investigation difficult.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Artifacts to look at re Web servers (3)

A
  • Logs (4 places)

- website content (possible for malicious content)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IIS Log File Contents

A
  • Client IP address
  • User name
  • Date
  • Time
  • Service and instance
  • Server name
  • Server IP
  • Time taken
  • Client bytes sent
  • Server bytes sent
  • Service status code
  • Windows status code
  • Request type
  • Target of operation
  • Parameters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Apache Log File

A
  • similar to IIS, different format

- ideal for grep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3rd Party Tools examples

A
  • have their own vulnerabilities
  • Content management systems
  • Joomla
  • vBulletin
  • Wikis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Log Location for IIS

A

C:\Windows\System32\LogFiles

  • \W3SVC1 (website logs)
  • \MSFTPSVC1 (FTP logs)

%SystemDrive%\Inetpub\Logs\Logfiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Microsoft FTP Status Codes:
200
226
250
331
332
421
A
200 - Command OK
226 - closing data connection (success)
250 - file action okay, completed
331 - user name ok, need pass
332 - need account for login
421 - connection closed, service not available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Microsoft IIS Status Codes:
200
201
401.1
401.3
403.1
403.2
403.3
403.14
A
200 - OK. The client request has succeeded.
201 - Created.
401.1 - Logon failed.
401.3 - Unauthorized due to ACL on resource.
403.1 - Execute access forbidden.
403.2 - Read access forbidden.
403.3 - Write access forbidden.
403.14 - Directory listing denied.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web site intrusion Tactics

A
  • uploaded executable code to web site and then viewing code through browser. - runs with privileges of service account.
  • modifying site contents
  • directory browsing and traversals
  • viewing parent paths
How well did you know this?
1
Not at all
2
3
4
5
Perfectly