Top Banner
Hacking Webservers Prof. Dr. Ameer Ali Professor & Chairman Department of Computer Science & Engineering Bangladesh University of Business and Technology (BUBT)
87

Hacking Webservers - fDLuDCf

Mar 12, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hacking Webservers - fDLuDCf

Hacking Webservers

Prof. Dr. Ameer Ali

Professor & ChairmanDepartment of Computer Science & Engineering

Bangladesh University of Business and Technology (BUBT)

Page 2: Hacking Webservers - fDLuDCf

Module Objectives

Page 3: Hacking Webservers - fDLuDCf

Web Server Market Shares

Page 4: Hacking Webservers - fDLuDCf

Web Server Security Issue

Page 5: Hacking Webservers - fDLuDCf

Why Web Servers Are Compromised

Page 6: Hacking Webservers - fDLuDCf

Open Source Web Server Architecture

Page 7: Hacking Webservers - fDLuDCf

IIS Web Server Architecture

Page 8: Hacking Webservers - fDLuDCf

Dos/DDoS Attacks

Page 9: Hacking Webservers - fDLuDCf

Dos/DDoS Attacks Tools

1. LOIC (Low Orbit Ion Cannon)-https://github.com/NewEraCracker/LOIC

2. XOIC - http://anonhacktivism.blogspot.com/2017/11/new-xoic-ddos-tool-download.html

3. HULK (HTTP Unbearable Load King) http://packetstormsecurity.com/files/112856/HULK-Http-Unbearable-Load-King.html

4. DDOSIM—Layer 7 DDOS Simulator- http://sourceforge.net/projects/ddosim/

5.R-U-Dead-Yet-https://code.google.com/p/r-u-dead-yet/

Page 10: Hacking Webservers - fDLuDCf

Dos/DDoS Attacks Tools

6. Tor’s Hammer - http://packetstormsecurity.com/files/98831/

7. PyLoris- http://sourceforge.net/projects/pyloris/

8. OWASP DOS HTTP POST -https://code.google.com/p/owasp-dos-http-post/

9. DAVOSET-http://packetstormsecurity.com/files/123084/DAVOSET-1.1.3.html

10. GoldenEye HTTP Denial Of Service Tool- http://packetstormsecurity.com/files/120966/GoldenEye-HTTP-Denial-Of-Service-Tool.html

Page 11: Hacking Webservers - fDLuDCf
Page 12: Hacking Webservers - fDLuDCf

Custom Attack

Page 13: Hacking Webservers - fDLuDCf

DNS Server Hijacking

Page 14: Hacking Webservers - fDLuDCf

DNS Amplification Attack

Page 15: Hacking Webservers - fDLuDCf

Directory Traversal Attacks

Page 16: Hacking Webservers - fDLuDCf

Directory Traversal Attacks

Page 17: Hacking Webservers - fDLuDCf

Example Traversal Attacks

Page 18: Hacking Webservers - fDLuDCf

Man-in-the- Middle/Sniffing Attack

Page 19: Hacking Webservers - fDLuDCf

ARP Spoofing for a MitM Attack

What we will be doing here, is using ARP spoofing to place ourselves between two machines making the client

believe we are the server and the server believe we are the client. With this, we can then send all the traffic through

our computer and sniff every packet that goes in either direction.

Hope all that makes sense! Let's get started with our MitM attack by opening up BackTrack!

Page 20: Hacking Webservers - fDLuDCf

arpspoof can do this for us by

replacing the MAC address of the

client and the server with our MAC

address in the ARP table.

Page 21: Hacking Webservers - fDLuDCf
Page 22: Hacking Webservers - fDLuDCf
Page 23: Hacking Webservers - fDLuDCf
Page 24: Hacking Webservers - fDLuDCf
Page 25: Hacking Webservers - fDLuDCf
Page 26: Hacking Webservers - fDLuDCf

Phishing Attack

Page 27: Hacking Webservers - fDLuDCf

Website Defacement

Page 28: Hacking Webservers - fDLuDCf

Web Server Misconfiguration

Page 29: Hacking Webservers - fDLuDCf

Web Server Misconfiguration Example

Page 30: Hacking Webservers - fDLuDCf

HTTP Response Splitting Attack

Page 31: Hacking Webservers - fDLuDCf

HTTP Response Splitting Attack (cont’d)

Page 32: Hacking Webservers - fDLuDCf
Page 33: Hacking Webservers - fDLuDCf

SSH Bruteforce Attack

Page 34: Hacking Webservers - fDLuDCf

Web Server Password Cracking

Page 35: Hacking Webservers - fDLuDCf

Web Server Password Cracking

Page 36: Hacking Webservers - fDLuDCf

Web Application Attacks

Page 37: Hacking Webservers - fDLuDCf

Web Server Attack Methodology

Page 38: Hacking Webservers - fDLuDCf

Web Server Attack Methodology: Information Gathering

Page 39: Hacking Webservers - fDLuDCf

Web Server Attack Methodology: Information Gathering From Robots.txt File

Page 40: Hacking Webservers - fDLuDCf

WebServer Attack Methodology :Webserver Footprinting

Page 41: Hacking Webservers - fDLuDCf

Webserver Footprinting Tools

Page 42: Hacking Webservers - fDLuDCf

Enumerating Webserver information Using Nmap

Page 43: Hacking Webservers - fDLuDCf

Nmap Scan

Page 44: Hacking Webservers - fDLuDCf

Webserver Attack Methodology: Mirroring a Website

Page 45: Hacking Webservers - fDLuDCf

Webserver Attack Methodology: Vulnerability Scanning

Page 46: Hacking Webservers - fDLuDCf

ACUNETIX WEB VULNERABILITY SCANNER

Page 47: Hacking Webservers - fDLuDCf

Webserver Attack Methodology: Session Hijacking

Page 48: Hacking Webservers - fDLuDCf

Webserver Attack Methodology: Hacking Web Passwords

Page 49: Hacking Webservers - fDLuDCf

Webserver Attack Tool: Metasploit

Page 50: Hacking Webservers - fDLuDCf

Metasploit Architecture

Page 51: Hacking Webservers - fDLuDCf

Metasploit Payload Module

Page 52: Hacking Webservers - fDLuDCf

Metasploit Auxiliary Module

Page 53: Hacking Webservers - fDLuDCf

Metasploit NOPS Module

Page 54: Hacking Webservers - fDLuDCf

Webserver Attack Tool :Wfetch

Page 55: Hacking Webservers - fDLuDCf

Web Password Cracking Tools:THC-Hydra and Brutus

Page 56: Hacking Webservers - fDLuDCf

Place Web Servers in Separate Secure Server Security Segment on Network

Page 57: Hacking Webservers - fDLuDCf

Countermeasures: Patches and Update

Page 58: Hacking Webservers - fDLuDCf

Countermeasures: Protocols

Page 59: Hacking Webservers - fDLuDCf

Countermeasures: Accounts

Page 60: Hacking Webservers - fDLuDCf

Countermeasures: files and Directories

Page 61: Hacking Webservers - fDLuDCf

Detecting Web Server Hacking Attempts

Page 62: Hacking Webservers - fDLuDCf

How to Defend Against Web Server Attackes

Page 63: Hacking Webservers - fDLuDCf

How to Defend Against Web Server Attacks(cont’d)

Page 64: Hacking Webservers - fDLuDCf

How to Defend against HTTP Response Splitting and Web Cache Poisoning

Page 65: Hacking Webservers - fDLuDCf

How to Defend against DNS Hijacking

Page 66: Hacking Webservers - fDLuDCf

Patches and Hotfixes

Page 67: Hacking Webservers - fDLuDCf

What is Patch Management

Page 68: Hacking Webservers - fDLuDCf

Identifying Appropriate Sources for Updates and Patches

Page 69: Hacking Webservers - fDLuDCf

Installation of a Patch

Page 70: Hacking Webservers - fDLuDCf

Implementation and Verification of a Security Patch or Upgrade

Page 71: Hacking Webservers - fDLuDCf

Patch Management Tool: Microsoft Baseline Security Analyzer (MBSA)

Page 72: Hacking Webservers - fDLuDCf

Patch Management Tools

Page 73: Hacking Webservers - fDLuDCf

Web Application Security: Syhunt Dynamic and N-Stalker Web Application Security Scanner

Page 74: Hacking Webservers - fDLuDCf

Web Server Security Scanners: Wikto and Acunetix Web Vulnerability Scanner

Page 75: Hacking Webservers - fDLuDCf

Web Server Malware Infection Monitoring Tool: HackAlert

Page 76: Hacking Webservers - fDLuDCf

Web Server Malware Infection Monitoring Tool: QualysGuard Malware detection

Page 77: Hacking Webservers - fDLuDCf

Web Server Security Tools

Page 78: Hacking Webservers - fDLuDCf

Web Server Penetration Testing

Page 79: Hacking Webservers - fDLuDCf

Web Server Penetration Testing

Page 80: Hacking Webservers - fDLuDCf

Web Server Penetration Testing

Page 81: Hacking Webservers - fDLuDCf

Web Server Penetration Testing

Page 82: Hacking Webservers - fDLuDCf

Web Server Penetration Testing

Page 83: Hacking Webservers - fDLuDCf

Web Server Pen Testing Tool: Core Impact@ Pro

Page 84: Hacking Webservers - fDLuDCf

Web Server Pen Testing Tool: Immunity CANVAS

Page 85: Hacking Webservers - fDLuDCf

Web Server Pentesting Tool: Arachni

Page 86: Hacking Webservers - fDLuDCf

Next Class• Web Application Penetration Testing• Vulnerabilities Testing• Web Application Hacking• How to Secure Web Application

Page 87: Hacking Webservers - fDLuDCf

Thank you

Q & A