CEH v10: 06_System_Hacking
- Cracking Password
- Escalating Privileges
- Executing Applications
- Hiding Files
- Covering Tracks
- Bypass the access control
- Gain access to the system
- Exploit vulnerabilities
- Gain privileges
- Execute applications
- Hide malicious activities
- Hide the evidence of compromising
Three type of authentication factors:
- Something i have : username, password, …
- Something i am : biometrics, …
- Something i possess : allowed / registered devices, …
Password Cracking is the method for extracting the password to gain authorized access to the target system in the guise of a legitimate user. Usually, only the username and password authentication are configured, but now password authentication is moving toward two-factor authentication or multiple-factor authentication.
A good password contain:
- Case sensitive letters
- Special characters
- Lengthy password (more than 8 character)
Types of Password Attacks
Don’t require any type of technical understanding and knowledge.
- Shoulder surfing
- Social Engineering
- Dumpster Diving
Active Online Attack
Directly interact with the target for cracking password.
A password cracking application is used along with with a dictionary file. This dictionary file contains entire dictionary or a list of known and common words. This is the most common type of password cracking. Systems are not vulnerable if they use a strong, unique alphanumeric password.
Brute Force Attack
Attempt to recover the password by trying every possible combination of characters until password is accepted. Common and basic technique.
Compromising a workstation by exploiting the vulnerability, and extract the log-on hashes. Hashing and other cryptography knowledge require.
Passive Online Attacks
Password Attack without probing the target.
Sniffing the packets with a packet sniffing tool within the Local Area Network (LAN), and inspecting the captured packets.
Man-in-the-Middle (MITM) Attack
The attacker involves himself into the communication, insert himself in.
- SSL Strip
- Burp Suite
- Browser Exploitation Framework (BeEF)
Replay Attack : Capture the packets and extract information such as password from it. Then generating a replay traffic with the injection of extracted information to gain access to the system.
Gain access to the system by using the preconfigured password. The default password can be find on the manufacturer site or through online tools.
Pre-computed hashes and Rainbow table
Comparing a password using a rainbow table. Rainbow Table is the pregenerated hashes of the words in a dictionary or the combination of characters. The advantage of Rainbow Table is the speed, because it takes less time to compare the hashes. The disadvantage is the time and storage, it takes much more time and storage to compute and store the hashes.
Distributed Network Attack (DNA)
Using the unused processing power of machines across the network to decrypt the hashes. DNA requires a DNA manager and DNS Clients. DNA Manager allocate small tasks over the distributed network to be computed in the background.
The attacker uses the information extracted by initial phases and guess the password. Not common method and the rate of failure is high.
Attacker plug in an USB Drive that contain a password hacking tool. Windows Autorun feature allows running the application automatically, if enabled.
Authentication is a verification process to identify any user or device.
Microsoft authentication protocols:
- Security Account Manager (SAM)
- NT LAN Manager (NTLM)
Security Account Manager (SAM)
SAM is database that stores credentials and other account parameters such as passwords for the authentication process in Windows. While the OS running, this database os locked to be accessed by any other service and process. There are several other security algorithms are applied to the database to secure and validate the integrity of data. Within Microsoft, SAM stores password in LM/NTLM hashing format. Windows XP and later versions do not store the value of LM hash, or when LM hash is exceeding 14 characters, it stores blank or dummy value instead.
NT Lan Manager is a proprietary authentication protocol by Microsoft. In the authentication process, user sends login credentials to a domain controller in hashed format. Domain controller responds to a challenge known as nonce to be encrypted by the password’s hash. This challenge is a 16 byte random number generated ny the domain controller. By comparing the challenge with the database, domain controller permit or deny the login. Microsoft upgraded its default authentication mechanism from NTLM to Kerberos.
NTLM has two version:
- NTLMv1 (Older)
- NTLMv2 (Improved)
For additional security layer, NTLM is combined with Security Support Provider.
Kerberos is an advanced authentication protocol. Clients receive tickets from Kerberos Key Distributor Center (KDC)
KDC depend upon two components:
- Authentication Server (AS)
- Ticket-Granting Server (TGS)
The client send a request to the AS to grant Tick-granting-ticket. The AS authenticates the client by comparing the user identity and password from its datbase and reply with Tick-Granting Ticket and a session key. The session key is for a session between client and TGS. Now, client can communicate with the Ticket-Granting Server (TGS). The client send TGT to TGS, ask for communication with another user. TGS reply with a Ticket and session key. Ticket and Session key is for communicating with other user within a trusted domain.
Password salting is the process of adding additional character in the password to one-way function. This makes the password more difficult to reverse the hash. The function os salting is to defeat the Dictionary Attacks and Rainbow Table attacks
Password file by Operating Systems
- Windows: SAM (
- Linux: Shadow (
- Domain Controller: NTDS:DIT
Password Cracking tools
- Cain and Abel
- John The Ripper
Password Cracking Countermeasures
- Change default password
- Do not store/save passwords in applications
- Do not use guessable passwords
- Set strong password
- Password encryption
- Keep credentials secure and secret
- Enable SYSKEY
- Password salting
- Advance security audits
- Periodically update passwords
- Monitor attacks
- Different password for each service
- Configure policies for incorrect password attempts
The main goal is to get a high-level access to the system.
Horizontal Privileges Escalation
The attacker attempts to gain access to user that has same set of privileges.
Vertical Privileges Escalation
The attacker attempts to escalate privileges to a higher level. Vertical privileges occurs when attacker is trying to gain access to the Administrator account. Higher privileges allow attacker to access sensitive information, modify files and execute programs.
Privilege Escalation using DLL Hijacking
Applications need Dynamic Link Libraries (DLL) to run. In Windows, most of the application search for DLL in directories, instead of using the full qualified path. The Attacker replace the DLL to a malicious one.
DLL Hijacking tool: Metasploit
Known DLLs are specified in the registry key:
Search paths used by Microsoft:
- Directory of application or current directory
- System directory (i.e. C:\Windows\System32)
- Windows directory
The Attacker’s next step is to execute malicious applications. This execution is for gaining access to system resources, crack passwords, set up backdoors and many more. This process is called as “System Owning”.
- Install malware to collect information
- Setup Backdoor to maintain access
- crack passwords and scripts
- Install Keylogger
RemoteExec is software designed for installation of application, execution of code and scripts remotely. RemoteExec can upload file across the network.
- Deploy packages
- Remotely execution of programs
- Scheduling execution
- Remote configuration (settings, files, …)
- Remote controlling (turn off, lock, …)
PDQ Deploy is a software for system administrators to install and send updates silently to the remote systems. It can silently deploy almost every application (.exe, .msi, …). It can install, uninstall, copy, execute and send files.
Keystroke logging, keylogging and keyboard capturing is a process of monitoring and/or recording the actions by any user. Logging the actions to steal information from the target machine.
- Capture the pushed buttons
- Take screenshots
- Capture mouse
- Many more…
Software-based keyloggers are remotely installed, or send it to the target to execute the application.
- Application keyloggers
- Kernel keyloggers
- Hypervisor-based keyloggers
- Form Grabbing based keyloggers
It is a physical hardware which are installed on hardware by physically accessing the device.
- PC/BIOS Embedded keyloggers
- Keylogger keyboard
- External keylogger (video, bluetooth, wi-fi, acoustic, …)
Anti-Keylogger is an application which ensures protection against keylogging by providing SSl protection, keylogging protection, clipboard logging protection and screen logging protection.
- Spyshelter Anti-keylogger
- Keystroke interference software
- Don’t click on doubtful URLs
- Anti-Keylogger software
- On-Screen keyboard for secrets
- Physical monitoring
- Host-based IDS
- File scanning prior to installation
Spywares are the software designed for gathering user interaction information with a system such as login credentials, emails and many more without informing the user of the system. The gathered information is sent to a remote destination. Spyware hides its files and processes to avoid detection.
- System monitors
- Tracking cookies
- Tracking users (i.e. keylogging)
- Monitor user’s activity
- Blocking services
- Remote delivery of logs
- Email tracking
- Record removable media communication (i.e. USB)
- Voice recording
- Video recording
- Tracking location (GPS)
- Mobile tracking
Rootkit is a software designed to provide privileged access to a remote user over a system, creates a backdoor. Deployed after attacker gain high-level access to a system. Rootkits often mask their existence to avoid detection.
- Application level rootkit: perform manipulation of standard application file with an injection of codes.
- Kernel-level rootkit: inject malicious code to the kernel
- Hardware/Firmware level rootkit: built into a chipset
- Hypervisor level rootkit: exploits hardware features like AMD-V or Intel VT
- Boot Loader level rootkits (Bootkits): replace the legitimate boot loader with the malicious one, which enables the bootkit to activated before an OS run. It can attack Master Boot Record (MBR), Volume Boot Record (VBR) or boot sector. It can be used to attack full disk encryption systems, hack encryption keys and passwords.
Detecting and Defending Rootkits
- Integrity-Based Detection
- Digital signatures
- Difference-based detection
- Behavior-based detection
- Cross-view based detection
- Run-time execution path profiling
- Anti-rootkit software
- Deploying a network-based firewall
- Host-based firewall
- Install application/OS from trusted sources
- Integrity verification
- Kernel memory dump analysis
- Microsoft Sysinternals Rootkit Revealer
- Sophos Anti-Rootkit
New Technology File System (NTFS) Data Stream
NTFS is a Windows file system by Microsoft. NTFS is the default file system for Windows 10,- 7,- Vista,- XP,- 2000,- NT.
Alternate Data Stream (ADS)
ADS is a file attribute in in NTFS file system, contains metadata for locating a particular file. ADS is capable of hiding file data into an existing file without altering or modifying any noticeable changes. It can be security threat because it can hide malicious files.
NTFS Streams Countermeasures:
- Moving file to a FAT partition (FAT doesn’t support ADS, but this will corrupt the file)
- Third-party tools (ADS Spy, ADS Tools, LADS, …)
Steganography is a technique for hiding sensitive information in an ordinary message to ensure the confidentiality. Steganography uses encryption to maintain the confidentiality and integrity. It hides the encrypted data to avoid detection. An attacker may use this to technique to transfer data without being detected.
Classification of Steganography
- Technical Steganography includes concealing information using methods like using invisible link, microdots.
- Linguistic Steganography uses text as covering media to hide information like using ciphers and code to hide information.
Types of Steganography
- Whitespace Steganography
- Image/Pixel Steganography
- Document Steganography
- Video Steganography
- Audio Steganography
- File/Folder Steganography
- Spam/Email Steganography
- Web Steganography
- Frequency Steganography
- Least Significant Bit Steganography
hide information in a text file using extra blank space inserted in between words covering file. Using LZW and Huffman compression method to decrease the size of the message.
Hidden information can be kept in image formats, such as PNG, JPG, others. Image steganography places redundant bits of the image in the message. It cannot be detected by human eye.
- Least significant bit insertion
- Masking and filtering
- Algorithm and transformations
- Stegohide (Linux)
Analysis of suspected information using steganography techniques to discover nad retrieve the hidden information.
- Stego-only: have only stego object
- Known stego: have stego object, algorithm and cover
- Known message: have stego object and hidden message
- Known cover: have stego object and cover
- Chosen message: generate stego form known message to identify the algorithm
- Chosen stego: have stego object and algorithm
After gaining access, escalating privileges, executing applications, the next step is to wipe the evidence. In this phase, attacker removes all the event logs, error messages and other evidence to prevent its attack from being discovered easily.
- Disable auditing
- Clearing logs
- Manipulating logs
Preventing another security mechanism to indicate an alert any sort of intrusion, and leaving to track leaving to track on the machine. The best practice for leaving no track and prevent detection is by disabling the auditing as you logged in on the system. It will not only prevent to log events, but also resist in the detection. Auditing in a system is enabled to detect and track events.
List auditing categories in windows:
Check all category audit policies:
By clearing logs, all events logged during the compromise will be erased.
Folder of log files:
Windows 2000/Server2003/Windows XP:
Server 2008/Vista and up:
- Clear cookies
- Clear cache
- Clear temporary files
- Clear Most Recent Used (MRU)