Top Banner
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002
25

Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Jan 01, 2016

Download

Documents

Isaac Stephens
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Hacker’s Strategies Revealed

WEST CHESTER UNIVERSITY

Computer Science Department

Yuchen Zhou

March 22, 2002

Page 2: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Requirements:• Hardware: -Two computers

-One hub

-Internet access

• Software: -Windows 98/2000

-Trojan horse (Glacier 6.0)

-Sniffer ( password monitor)

-Port scanner (Fluxay IV)

Page 3: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Case 1: Trojan Horse:

• Suppose a Trojan horse (server.exe) was installed on computer A already.

• One can execute a control program(client.exe) on computer B to control computer A.

Page 4: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Planting a Trojan Horse

• Direct execution of a Trojan horse• Sent as an e-mail attachment• Link an icon (as a “bait”) to a Trojan Horse• Guess password of a user and then use remote execution

Page 5: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Hacking Remotely

• Run a client program to control the compromised system remotely

Page 6: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Searching...

port

delay time

domain

begin from

to

Victim found

Page 7: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

All folders and filesin computer A. We cancopy, rename, run or delete them remotely.

All folders and filesin computer A. We cancopy, rename, run or delete them remotely.

Page 8: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Computer A’s basic information

System informationof computer A.

System informationof computer A.

Passwordrelated commands

Controlrelatedcommands

Networkrelatedcommands

Page 9: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

All the passwords in computer A's cache.

Password in cache

Page 10: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Monitoring computer A’s screen

Page 11: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Controlling Computer A’s screen

Page 12: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Other operations you can use to control computer A

• Find/copy/delete files from computer A

• Share a directory

• Kill a process

• Change the registry

• Record the keyboard

• Shut/restart the computer

Page 13: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

All commandswe can use

Page 14: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Case 2: Sniff a Password

• If computer A transmits some data frames to a server machine D via an Ethernet, every computer will receive a copy.

• Only computer D should accept it; others should discard the data frames.

• However, a sniffer running on machine B or C receives it and analyzes it even B or C is not the destination.

Page 15: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Page 16: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

The URL computer A visiting

username

password

Computer A’s IP address

log on time

monitoring NIC

When the password was detected, it will display here.

When the password was detected, it will display here.

Page 17: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

This file’s name is “webfilter.txt”, “pwmonitor” need this file to identify the URLs. That is to say, only when the URL computer A visiting is in this filter file can the passwords be sniffed. Because this sniffer is created in China, most of the URLs located in China, but we can find yahoo.com here.

This file’s name is “webfilter.txt”, “pwmonitor” need this file to identify the URLs. That is to say, only when the URL computer A visiting is in this filter file can the passwords be sniffed. Because this sniffer is created in China, most of the URLs located in China, but we can find yahoo.com here.

Page 18: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Case 3: Hack a Server

• Computer A is a server, B is a client

• Scans the ports of computer A

• Guesses the password of admin.

• After the computer is compromised, a hacker can plant some backdoor software to the server and execute it remotely.

Page 19: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Hosts’ typeHosts’ type

username password hosts

Flaxuy is the most popular ports scanner used in China these days.It scans all services (ports) of the servers provide, once it finds a certain service (FTP, telnet...), it will try to find the users and guess the passwords...

Flaxuy is the most popular ports scanner used in China these days.It scans all services (ports) of the servers provide, once it finds a certain service (FTP, telnet...), it will try to find the users and guess the passwords...

Page 20: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Scan from

to

Host type

Guess password

Display password if get

Page 21: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Scanning...

Page 22: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Now we get thepassword.

Page 23: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Computer 144.26.30.40’s Administrator is “TopTooler”,the password is “toptooler”, we can establish a IPC connection.

Computer 144.26.30.40’s Administrator is “TopTooler”,the password is “toptooler”, we can establish a IPC connection.

password

Page 24: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

Using this command, we can log on to the server as an administrator.

Using this command, we can log on to the server as an administrator.

Then copy a Trojan horse to a server

Then copy a Trojan horse to a server

Page 25: Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.

The Trojan horse will be started automatically

at 13:50p.m. on the server.

The Trojan horse will be started automatically

at 13:50p.m. on the server.