Introduction to Ethical Hacking

Temple University

MIS-5211 Week 5 Reading Summary, Question, and recent Cyber Security News…

MIS-5211 Week 5 Readings, Question, and recent Cyber Security News…

  1. Summarize one key point from each assigned reading…

1A. “System enumeration” (footprinting) – is the process by hackers and/or security administrators of gathering cyber info (profile of computer systems, users, network, etc.) for vulnerability access. The best defense for online businesses is an evolving holistic approach (integrated & layered security protection setup [policy, procedures, awareness, technology, etc.] that changes over time.)

1B. “User enumeration” – regarding enumeration of networked servers (identify user accounts & net resources [shared directories]), one must use different/similar internal & external command utilities & installed apps on Windows & UNIX servers when gathering this information.

Windows system examples: “net user” internal command utility (enumerate users)

UNIX system examples: “finger” internal command utility (enumerate users & hosts)

  1. Question to classmates (facilitates discussion) from assigned reading…

Regarding online systems enumeration (identify user accounts & net resources [shared directories]) on networked Windows servers, what is the one way to hide shared networked directories?

*Answer is the following: use the “ $ ” keyboard character at end of shared net directory name (example… ftp$ )

  1. Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…

In the Cyber Security News lately…

Security Bug allows Hackers to take Control of Curiosity Rover’s OS…

http://www.ehackingnews.com/2015/09/security-bug-allows-hackers-to-take.html

… “Serious security flaws has been discovered in VxWorks, a real-time operating system made by Wind River of Alameda, California, US, in 1987. The OS is used from network routers to critical instruments like NASA’s Curiosity Rover on Mars and Boeing 787 Dreamliners.”

Week 5 Readings and In the News

Foot Printing and Enumeration

As the first steps in hacking process, Foot Printing/Reconnaissance is intended for information gathering of the target organization using publicly accessible information without being intrusive. It may include information such as: DNS information, DNS zones, IP ranges, host names, services/ports/protocols used, potential applications, email address aliases to reveal usernames, publicly accessible internal network resources, identifying potential resources and systems in the network, read HTML codes of target web site pages. Simply reading news and reading online articles about security postures related to targeted organization may reveal a lot of potential vulnerabilities. Collect as much as information as possible to find weaknesses and act upon them. Various tools should be used in order to obtain such information such as: google content hacking with certain commands, whois, dig, nslookup, ping, traceroute, usenet, Teleport Pro, wget, Foca for Windows, Linux Kali as greatest collection of hacking tools and commands.

As the next step, Enumeration process would involve scanning system and networks to reveal detailed information, such as: user accounts, host names, OS types. It is done by querying database of target’s Registrar, then Organizational Queries, Domain Queries, Network Queries and POC Queries.  Some of the tools used here are: nslookup, trace route, enum, finger, nmap, fping, hping, TCP and UDP Scans, Ping Sweeps, strobe, superscan, IPeye, SATAN, NetCAT, WArDialing tools, nbtstat, nbtscan, nltest, ruser, telnet, tftp, rpcdump, rpcinfo.

Gaining Access to targeted systems would involve using Vulnerability scanners such as Nessus or Armitage exploit analysis in KALI Linux. Crack passwords using hash crackers such as NghashCrack. Sniff Data using WireShark or TCP Dump tools.

Bottom line is that in order to maximally protect organization against different hacking threats it is important to design multi-layered enterprise architecture to create multi-leveled traffic filtering and access control approach.  Therefore, it is important to act and think as a “white” hacker!

Question to the Class:

What multilayered solution would be optimal for various types of businesses?

In the News:

The hackers embedded the malicious code in Apple apps by convincing developers of legitimate software to use a tainted, counterfeit version of Apple’s software for creating iOS and Mac apps, which is known as Xcode, Apple said.

http://www.cnbc.com/2015/09/20/apples-ios-app-store-suffers-first-major-attack.html

Week 5 Takeaways

Reading Summary: Enumeration and Footprinting

The Enumeration process identifies valid user accounts or any weak component/resource. Some of the key areas of information include user and groups, network resources, and applications and banners. There are various tools used for this process such as Windows NT/2000 Enumeration which contains remote admin tools and port assignments for common UNIX utilities. Another tool is called NetWare Enumeration which is a Novell based tool that checks the status of all the servers on the opponent’s network as well browse he NDS trees all the way to the end lead using this tool. UNIX Enumeration displays user’s home directory, login and idle time, office location, etc. via the “finger” command.

Footprinting is the initial step in hackers information gathering which displays critical information regarding remote access capabilities, profile of the company’s Intranet/extranet, etc.  This will then allow hackers to build a database with all of the company’s security weaknesses. Footprinting is accomplished various ways such as via open source searching, network enumeration, DNS interrogation and network reconnaissance. Companies are struggling and in need of protection their infrastructure against Denial of Service attacks. The installation of an anti-virus is no longer as critical as having a holistic approach in place that provides layers of security posture (attributes ranging from policy, procedures, awareness, and technology) which will prevent the hacker to footprint the company’s network, if not, make it a harder process of obtaining critical information.
Article: Military Battles to Man its Developing Cyber Force

The U.S. Defense Department is assembling 133 Cyber Mission Force teams to defend military networks, protect critical U.S. infrastructure, and strike back in cyberspace when necessary. This team was to be in place by the end of 2016, however, with the requirements of fully manned, trained, and equipped it will now be extended by fiscal year 2018. In addition, there will be 5,825 cyber personnel to join by 2018 ranging in each division: army, air power, navy, and marines. The last resource of seeking civilians is within the reserve where six of the Air Forces cyber teams will reside, as well as up to 2,000 Reserve and National Guard personnel. It is important to note that these are people who currently work in the cyber field which means their skills and training are current.

Interested in reading more about this article? If so, you can do so here.

Question for the class:

Have you previously been exposed, or are currently, in using an enumeration tool for your company? If so, what have you found to be the weakest components of the company’s infrastructure?

Week 4 Reading, Question and Article

Reading Summary

This week’s reading was about vulnerability scanning. The reading talked about how scanning for vulnerabilities is a better and more proactive solution than using a password to protect files and waiting until something bad happens. The product used to talk about vulnerability scanning was Nessus. Nessus is free, open-source and powerful remote vulnerability scanner. Nessus needs to be updated with its latest library of plugins along with other tools such as firewalls, IDS, IPS .etc. to proactively protect systems. The article also contains instructions on how to install, configure and setup Nessus to run scans.

Question

What kind of protection will you use to protect smartphones and mobile devices given to employees by your organization from information security breaches?

Article

http://sites.utexas.edu/iso/2015/09/15/android-5-lockscreen-bypass/

I found this article interesting because it talks about how Android 5.x OS phones could be “hacked” by adding enough characters in the password field to crash the lockscreen process.

Week 4 SANS Reading and article

The importance of vulnerability scanning cannot be minimized.  The attack vectors routinely target systems which are vulnerable from an upgrade, patch or security perspective.   Organizations which have implemented vulnerability scanners such as Nessus provide themselves with some protection for known vulnerabilities and ensuring their configurations are up to date.  The only downside is the vulnerability engines are limited to the vulnerabilities it is aware and has a plug-in for.  This type of solution works best when coupled with firewall and IDS systems to add layers of defense to your organization while proactively protecting your systems.

This weeks article illustrates the risk associated with email specifically in the health care industry.

http://www.databreachtoday.com/sutter-health-incident-illustrates-email-risks-a-8533

 

Sans Reading and Article of the Week

Regularly testing your technical shortfalls and security gapes by third-party vendors is always a good start if you are not sure where to start; however fancy it may be, can be daunting at times and many will agree that is expensive. Third-party vendors will give you a head start but how will you maintain the momentum after they long gone and you are back in square one. Additionally, these sorts of assessments only provide a “snapshot in time” of a system security posture. However, organization risk and security profile continuously changes and evolves over time due to a variety of reasons. The best way to stay ahead f the curve is by constantly scanning in-house using both manual vulnerability assessments and scan using automated scanning tools. One such tool is Nessus that can help your organization is a freeware utility designed to identify the vulnerable points of a system and provide the information on how to fix them.

Nessus is widely viewed as a hacker reconnaissance tool, so you have to ensure the “rules of engagement” have been defined and a written permission to use the too has been given before use. You should begin by performing a scan against the host and then the clients. Results should be evaluated by security personnel to ensure accuracy and to provide relative interpretation of the results. The best thing is to concentrate on the critical vulnerabilities on the report; those risks should be mitigated immediately. The results should not be disseminated across the organization to ensure confidentiality, privacy and security.

This weeks interesting security article comes from wired magazine. Ever wondered if you have been spied on by the National intelligence agencies such as NSA, or foreign ones such as British GCHQ…well now you can find out who spied on you. Please use link below for further information.

Wired Magazine Link: http://www.wired.com/2015/09/now-can-find-nsa-gchq-spied

Week Four Reading, Question, and InTheNews

Week Four Reading:  Mitchel, J. (2002). Proactive Vulnerability Assessments with Nessus, SANS Institute.  Once setup and configured, Nessus is a powerful tool for applying signatures for detecting known vulnerabilities in a computer system.  I found the author’s instruction about saving time with operating systems and databases by proactively setting up the system’s security configuration settings prior to running the first Nessus scan particularly useful: “If you don’t spend the time to properly harden a system before putting it on the network, you’ll spend countless hours tracking down the numerous vulnerabilities that Nessus will detect.”

Question for the class: The article suggests great caution in particular aspects of using Nessus. In which specific ways can Nessus specifically threaten operation of a target computer system being scanned?

News of the Week: Apache Spark Cluster 1.3.X –Arbitrary Code Execution https://www.exploit-db.com/exploits/36562/   Apache Spark is an open source cluster computing framework with multi-stage in-memory processing primitives provides performance up to 100 times faster than Hadoop’s two-stage disk-based MapReduce paradigm https://www.sigmoid.com/securing-apache-spark-cluster/.  Spark clusters which are not secured with a proper firewall, however, do not have any authentication mechanism and can be taken over easily.  The exploit described in the Exploit Database articles illustrates how to take over and run arbitrary code over an unprotected cloud-based Apache Spark cluster resource.

MIS-5211 Week 4 Reading Summary & Cyber Security News…

Review my following MIS-5211_Wk4 class preparation information findings:

Week 4 Readings, Question, and In the Cyber Security News…

  1. Summarize one key point from each assigned reading…

In order to proactively check + protect one’s own business computer network from on-going vulnerabilities (IN & OUT), one can periodically deploy the robust & low-cost NESSUS computer network vulnerability scanner (identify issues & provide fix-it information.) Additionally for matter of convenience, use a UNIX-based portable laptop computer with the NESSUS Server & Client already installed (check for network vulnerabilities at many different places on one’s business networks.)

  1. Question to classmates (facilitates discussion) from assigned reading…

Since the NESSUS network vulnerability system is dependent on special current known “plug-ins” (similar to anti-virus software definitions), how then to detect & provide fix-it information for the unknown, new network vulnerabilities?

*NOTE: Review the latest NESSUS plug-ins from the Tenable Network Security organization…

www.tenable.com/plugins/index.php?view=newest

  1. Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…

In the Cyber Security News lately…

CAPTCHA-bypassing malware found in Google Play…

www.ehackingnews.com/2015/09/captcha-bypassing-malware-found-in.html

“Bitdefender Security Researcher, Liviu Arsene has recently revealed that a malware, identified as Android.Trojan.MKero.A has found its way into the highly legitimate apps in Android powered Google Play Store by successfully evading the Google Bouncer’s vetting algorithms. This can cause a lot of trouble for the vendors who provide paid premium services of their products as the malware can now make the services available for free.”

Week Four Summary

Vulnerability scanning is important one can find the weaknesses and avenues of approach an enemy can find. You are finding those weaknesses out first in order to fix them, before an enemy can find the weaknesses and exploit them. Nessus is a great yet expensive vulnerability scanner. You must have the permission of the security team and senior management before scanning, since Nessus is viewed as a hacker recon tool. You can scan for one host, or your whole network if desired. The results will be included in a text document, with the indicated vulnerabilities and CVEs. One must keep this document secret from outside eyes, since information about company vulnerabilities would be saving your enemies the work of recon. You must combine other vulnerability scanners in with your assessment to truly uncover all the weaknesses in your network or hosts.

News Article:

http://www.bbc.com/news/world-us-canada-34229439

Obama states that Chinese hacking of American assets is unacceptable, and that he will not be staying at any Chinese funded hotels. In terms of cyber warfare, Obama stated, “I guarantee you, we will win if we have to.” MURICAH!

Week 4 Reading Summary and In the News

Reading Summary:

Many business in nowadays forget about critical asset of their business; that is, Protecting Business Data. Unfortunately, most owners and management take care only about customers and business processes that directly generate revenue versus enterprise network that only provides tools to support business. For so many years, vulnerabilities have become more and more sophisticated alerting many companies of required precautions, but despite thousands of hacks, only some business owners really understand the importance of protecting data at all costs. While auditors and external consultants may be expensive service to perform proactive vulnerability scans, there are many free tools, such as Nessus, Qualisys and a few others that are free and help to build a vulnerability report that would help to assess networks and help to create mitigation reports as well as build a baseline framework for all systems to improve security hardening. While Nessus would be a good choice for network scan, it reports only what it finds in its plug-in database. Therefore, vulnerability scan internally within local network using others tools such as MBSA, Nmap, RapidFire, Nexpose/Rapid7, OpenVAS and a few others would be important to have diversity of vulnerability reports.

Question to the Class:

What solution did you use in the past? Which tool you find most comprehensive?

In the News:

New Apple products released on Wednesday Sept. 9th, will include enhanced security feature by requiring dual-factor authentication: 6-digit code + Fingerprint scan to various Apps. This new security feature should lead Enterprise Businesses to upgrade their devices in order to minimize risk of attacks.

Posted by CNBC on Friday, 11 Sep 2015 | 1:16 PM ET

http://www.cnbc.com/2015/09/11/apple-ramps-up-its-cybersecurity-game.html