Top Banner
Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009
56

Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

Jan 04, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

Behind Enemy Lines

Administrative Web Application Attacks

Rafael Dominguez Vega

12th of March 2009

Page 2: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

2

Main Objectives

• Insecurities

• Impact

• Attack Techniques

Page 3: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

3

A little about me ...

Page 4: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

4

What this talk will cover

• Intro

• DHCP Script Injection Attack

• SSID Script Injection Attack

• Scanning for Webmin Servers Attack

• Recommendations, Summary & QA

Page 5: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

5

Introduction

Page 6: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

6

Administrative Web Interfaces

• Administer Systems and Networks

• Help Administrators

• Most Network Systems have One

Page 7: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

7

Why should they be secured?

• Vulnerable as any other Web Application

• Highly Privileged Access

• Different Services, Systems and Protocols

• Used in “Trusted Environment”

Page 8: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

8

Today’s Web Application Attacks

• User Input Validation

• Security Best Practice

• Out of Band Channels

Page 9: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

9

DHCP Script Injection Attack

Page 10: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

10

DHCP “HandShake”

Page 11: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

11

DHCP Request Packet

Page 12: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

12

DHCP Script Injection Attack

• Active DHCP Leases List

• Attacker located in same LAN

• To Be Vulnerable

Page 13: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

13

DHCP Script Injection Attack

Page 14: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

14

DHCP Script Injection Attack

Page 15: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

15

DHCP Script Injection Attack

Page 16: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

16

DHCP Script Injection Attack

Page 17: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

17

DHCP Script Injection Attack - DEMO

• pfSense

• Tool

• Remote Command Execution

Page 18: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

18

SSID Script Injection Attack

Page 19: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

19

SSID Script Injection Attack

• 802.11 Protocol

• Management Beacon Frames

• Malicious Code in SSID

Page 20: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

20

SSID Script Injection Attack

• “Scan for Neighbours AP” Functionality

• Attacker located in Wireless Range

• Max. SSID length = 32 Characters

• SSID1/** **/SSID2 = 64 Characters

• Access to Internet Attacker Server

Page 21: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

21

SSID Script Injection

Page 22: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

22

SSID Script Injection

Page 23: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

23

SSID Script Injection

Page 24: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

24

SSID Script Injection

Page 25: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

25

SSID Attack - DEMO

• Linksys – DD-WRT firmware

• Tool

• Disable Wireless Encryption

Page 26: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

26

Scanning for Webmin Servers Attack

Page 27: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

27

Webmin

Page 28: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

28

Scanning for Webmin Servers

Page 29: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

29

Scanning for Webmin Servers Attack

• Attacker located in same Network

• Redirect user to fake Webmin Server

• Obtain Administrator Credentials

• CSRF

Page 30: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

30

Scanning for Webmin Servers Attack

Page 31: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

31

Scanning for Webmin Servers Attack

Page 32: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

32

Scanning for Webmin Servers Attack

Page 33: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

33

Demo

Page 34: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

34

Webmin Web Based Attack Propagation

Page 35: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

35

Webmin Web Based Attack Propagation

Page 36: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

36

Webmin Web Based Attack Propagation

Page 37: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

37

Webmin Web Based Attack Propagation

Page 38: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

38

Webmin Web Based Attack Propagation

Page 39: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

39

Webmin Web Based Attack Propagation

Page 40: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

40

Webmin Web Based Attack Propagation

Page 41: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

41

Webmin Web Based Attack Propagation

Page 42: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

42

Webmin Web Based Attack Propagation

Page 43: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

43

Webmin Web Based Attack Propagation

Page 44: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

44

Webmin Web Based Attack Propagation

Page 45: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

45

Webmin Web Based Attack Propagation

Page 46: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

46

Webmin Web Based Attack Propagation

Page 47: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

47

Webmin Web Based Attack Propagation

Page 48: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

48

Webmin Web Based Attack Propagation

Page 49: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

49

Webmin Web Based Attack Propagation

Page 50: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

50

Webmin Web Based Attack Propagation

Page 51: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

51

Recommendations

Page 52: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

52

Recommendations

Page 53: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

53

Recommendations

• Assess Deployment

• Do not Trust your Internal Network

• Penetration Testing

• Strict Security Policy

• Risk Management

Page 54: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

54

Summary

• Vulnerable as any other Web Application

• Additional Attack Vectors

• “Scanning”, “Detecting “ ,“Finding” Functionality

• Risks Increased

• Used in “Trusted Environment”

Page 55: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

55

References & Further Reading

Project Web Site:

http://labs.mwrinfosecurity.com/

Contact Me

rafael.dominguez-vega( )mwrinfosecurity!com

Page 56: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

56