lesson 9 common windows exploits. utsa is 3523 id and incident response overview top 20 exploits...

31
Lesson 9 Common Windows Exploits

Upload: kathleen-beasley

Post on 16-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

Lesson 9Common Windows Exploits

Page 2: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Overview

• Top 20 Exploits• Common Vulnerable Ports• Detecting Events

Page 3: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

SANS/FBI Top 20 List

• Publish list of the Twenty Most Critical Internet Security Vulnerabilities

• www.sans.org/top20

• Updated in October (or sooner if necessary)

• Thousands use this list to close up holes in their system

• Most incidents traced back to Top 20 list

Page 4: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

SANS/FBI Top 20 List

• Based on facts, attackers– are opportunistic– take the easiest and most convenient route– exploit the best-known flaws with the most

effective and widely available attack tools– count on organizations not fixing the “holes”

Page 5: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

SANS/FBI Top 20 List

• List broken down into two sections

• Two Top Ten lists– Ten most commonly exploited vulnerable

services in Windows

– Ten most commonly exploited vulnerable services in Unix

Page 6: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W1: Internet Information Services (IIS)

• IIS prone to vulnerabilities in three major classes– Failure to handle unanticipated requests– Buffer overflows– Sample applications

• Target port: TCP Port 80 (http)

Page 7: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Failure to Handle Unanticipated Requests

• IIS has a problem handling improperly formed HTTP requests – Web folder traversal (unicode)

• Allows– view of the source code of scripted applications

– view of files outside the Web document root

– view of files Web server has been instructed not to serve

– execution of arbitrary commands on the server• deletion of files, uploading of rootkits, creation of backdoors

Page 8: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Buffer Overflows

• Many ISAPI and SSI extensions vulnerable to buffer overflows– .asp / .htr / .idq / printer

• A carefully crafted request from a remote attacker may results in– Denial of Service– Execution of arbitrary code and/or commands in the

Web server’s user context• through the IUSR_servername account (like anonymous)

Page 9: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W2: Microsoft SQL Server

• Microsoft SQL Server contains several serious vulnerabilities that allow remote attackers to– obtain information– alter database content– compromise SQL servers– compromise server hosts

• There’s Was an MSSQL worm released in May 2002

Page 10: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W2: Microsoft SQL Server

• Target port: TCP port 1433

• OS’s affected– Microsoft SQL Server 7.0– Microsoft SQL Server 2000– Microsoft SQL Server Engine 2000

Page 11: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W2: Microsoft SQL Server

• How to detect a compromise:

• First thing you’ll see is the “probing” or “fishing” for information– Probes on port 1433– Attacker is looking for those boxes that

respond “positively” to a probe on port 1433• tells them box is “listening” (or has the port

open) on port 1433

Page 12: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W3: General Windows Authentication

• Accounts with No Passwords or Weak Passwords

• Only protection is to have a strong password and good password habits

• With advent of Windows XP consider “everyday” accounts at user privilege

Page 13: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W3: LAN Manager Authentication

• Most current Windows environments have no need for LAN Manager (weak hashing)– Most use NTLM now

• But Windows NT, 2000, and XP do have LM by default

• LM has a very weak encryption scheme

• Won’t take a hacker long to crack passwords

Page 14: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

• OS’s affected:– Windows 95, Windows 98, Windows NT, Windows

Me, Windows 2000, and Windows XP

• Main objective:– gather info about guest host names

– try these guest host names with null passwords until one works

– attacker will then attempt to download the entire database of userid’s and/or passwords

W3: Unprotected Windows Networking Shares(NetBios)

Page 15: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W4: Internet Explorer

• Consequences can include– Disclosure of cookies– Disclosure of local files or data *– Execution of local programs *– Download and execution of arbitrary code *– Complete takeover of vulnerable system *

* Most Critical

Page 16: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W4: Internet Explorer

• Default web browser installed on MS Windows platforms

• All existing IE’s have critical vulnerabilities

• A malicious web administrator can design web pages to exploit these vulnerabilities– Just need someone to browse the web page

Page 17: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W4: Internet Explorer

• Vulnerabilities can be categorized into multiple classes– Web page spoofing– ActiveX control vulnerabilities– Active scripting vulnerabilities– MIME-type and content-type misinterpretation– Buffer overflows

Page 18: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W5: Unprotected Windows Networking Shares(NetBios)

• MS Windows provides a host machine with the ability to share files or folders across a network

• Underlying mechanism of this feature is the– Server Message Block (SMB) protocol, or the– Common Internet Files System (CIFS)

protocol

• Target Port: TCP Port 139

Page 19: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W5: Anonymous Logon -- Null Sessions

• This vulnerability is very similar to the one described before in Netbios

• Attacker is looking for a host name with a null password

• Attacker uses IPC$ (called IPC shares) with a double-double quote (“”) in place of a password

Page 20: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W6: Microsoft Data Access Components (MDAC)--Remote Data Services

• RDS component in older versions of MDAC has flaws that allow a remote user to run commands locally with administrative privileges

• This exploit is readily used to deface Web pages• Check Web Server Logs to make sure

Page 21: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

W7: Windows Scripting Host (WSH)

• Permits any text file with a “.vbs” extension to be executed as a Visual Basic script

• A typical worm propagates by including a VBScript as the contents of another file and executes when that file is viewed or in some cases previewed

Page 22: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

The Other 3

W8: Outlook and Outlook Express

W9: P2P File Sharing

W10: Simple Network Mgt Protocol

Page 23: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Common Vulnerable Ports

• Login Services– telnet (port 23/tcp)– SSH (port 22/tcp)– FTP (port 21/tcp)– NetBIOS (port 139/tcp)– rlogin (port 512 - 514/tcp)

Page 24: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Common Vulnerable Ports

• RPC and NFS– portmap/rpcbind (port 111/tcp and udp)– NFS (port 2049/tcp and udp)– lockd (port 4045/tcp and udp)

• Xwindows– port 6000/tcp through 6255/tcp

Page 25: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Common Vulnerable Ports

• Naming services– DNS (port 53/udp) for all machines that are

not DNS servers– DNS (port 53/tcp) for zone transfer requests– LDAP (port 389/tcp and udp)

Page 26: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Common Vulnerable Ports

• Mail– SMTP (port 25/tcp) for all machines that are

not external mail relays– POP (port 109/tcp and port 110/tcp)– IMAP (port 143/tcp)

Page 27: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Common Vulnerable Ports

• Web– HTTP (port 80/tcp)– SSL (port 443/tcp) except to external Web

servers– HTTP proxies

• port 8000/tcp

• port 8080/tcp

• port 8888/tcp

Page 28: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Common Vulnerable Ports

• “Small services”– ports below 20/tcp and udp– time (port 37/tcp and udp)

• Miscellaneous– TFTP (port 69/udp)– Finger (port 79/tcp)– NNTP (port 119/tcp)

Page 29: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Common Vulnerable Ports

• Miscellaneous (continued)– NTP (port 123/udp)– LPD (port 515/tcp)– syslog (port 514/udp)– SNMP (port 161/tcp and udp, and port

162/tcp and udp)– BGP (port 179/tcp)– SOCKS (port 1080/tcp)

Page 30: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

Common Vulnerable Ports

• ICMP– block incoming “echo” requests (ping and

Windows traceroute)– block outgoing “echo” replies, “time

exceeded,” and “destination unreachable”• except “packet too big” messages

Page 31: Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events

UTSA IS 3523 ID and Incident Response

How To Detect and Investigate

• http://www.sans.org/top20/tools04.pdf

• Run an IDS and review logs for common signatures…especially IIS hacks

• Aggressively review web server logs

• Ensure FTP application logging turned on…then review FTP logs

• Know your network…and know what is abnormal