YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

Behind Enemy Lines

Administrative Web Application Attacks

Rafael Dominguez Vega

12th of March 2009

Page 2: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

2

Main Objectives

• Insecurities

• Impact

• Attack Techniques

Page 3: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

3

A little about me ...

Page 4: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

4

What this talk will cover

• Intro

• DHCP Script Injection Attack

• SSID Script Injection Attack

• Scanning for Webmin Servers Attack

• Recommendations, Summary & QA

Page 5: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

5

Introduction

Page 6: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

6

Administrative Web Interfaces

• Administer Systems and Networks

• Help Administrators

• Most Network Systems have One

Page 7: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

7

Why should they be secured?

• Vulnerable as any other Web Application

• Highly Privileged Access

• Different Services, Systems and Protocols

• Used in “Trusted Environment”

Page 8: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

8

Today’s Web Application Attacks

• User Input Validation

• Security Best Practice

• Out of Band Channels

Page 9: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

9

DHCP Script Injection Attack

Page 10: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

10

DHCP “HandShake”

Page 11: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

11

DHCP Request Packet

Page 12: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

12

DHCP Script Injection Attack

• Active DHCP Leases List

• Attacker located in same LAN

• To Be Vulnerable

Page 13: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

13

DHCP Script Injection Attack

Page 14: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

14

DHCP Script Injection Attack

Page 15: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

15

DHCP Script Injection Attack

Page 16: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

16

DHCP Script Injection Attack

Page 17: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

17

DHCP Script Injection Attack - DEMO

• pfSense

• Tool

• Remote Command Execution

Page 18: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

18

SSID Script Injection Attack

Page 19: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

19

SSID Script Injection Attack

• 802.11 Protocol

• Management Beacon Frames

• Malicious Code in SSID

Page 20: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

20

SSID Script Injection Attack

• “Scan for Neighbours AP” Functionality

• Attacker located in Wireless Range

• Max. SSID length = 32 Characters

• SSID1/** **/SSID2 = 64 Characters

• Access to Internet Attacker Server

Page 21: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

21

SSID Script Injection

Page 22: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

22

SSID Script Injection

Page 23: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

23

SSID Script Injection

Page 24: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

24

SSID Script Injection

Page 25: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

25

SSID Attack - DEMO

• Linksys – DD-WRT firmware

• Tool

• Disable Wireless Encryption

Page 26: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

26

Scanning for Webmin Servers Attack

Page 27: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

27

Webmin

Page 28: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

28

Scanning for Webmin Servers

Page 29: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

29

Scanning for Webmin Servers Attack

• Attacker located in same Network

• Redirect user to fake Webmin Server

• Obtain Administrator Credentials

• CSRF

Page 30: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

30

Scanning for Webmin Servers Attack

Page 31: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

31

Scanning for Webmin Servers Attack

Page 32: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

32

Scanning for Webmin Servers Attack

Page 33: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

33

Demo

Page 34: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

34

Webmin Web Based Attack Propagation

Page 35: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

35

Webmin Web Based Attack Propagation

Page 36: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

36

Webmin Web Based Attack Propagation

Page 37: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

37

Webmin Web Based Attack Propagation

Page 38: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

38

Webmin Web Based Attack Propagation

Page 39: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

39

Webmin Web Based Attack Propagation

Page 40: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

40

Webmin Web Based Attack Propagation

Page 41: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

41

Webmin Web Based Attack Propagation

Page 42: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

42

Webmin Web Based Attack Propagation

Page 43: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

43

Webmin Web Based Attack Propagation

Page 44: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

44

Webmin Web Based Attack Propagation

Page 45: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

45

Webmin Web Based Attack Propagation

Page 46: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

46

Webmin Web Based Attack Propagation

Page 47: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

47

Webmin Web Based Attack Propagation

Page 48: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

48

Webmin Web Based Attack Propagation

Page 49: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

49

Webmin Web Based Attack Propagation

Page 50: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

50

Webmin Web Based Attack Propagation

Page 51: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

51

Recommendations

Page 52: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

52

Recommendations

Page 53: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

53

Recommendations

• Assess Deployment

• Do not Trust your Internal Network

• Penetration Testing

• Strict Security Policy

• Risk Management

Page 54: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

54

Summary

• Vulnerable as any other Web Application

• Additional Attack Vectors

• “Scanning”, “Detecting “ ,“Finding” Functionality

• Risks Increased

• Used in “Trusted Environment”

Page 55: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

55

References & Further Reading

Project Web Site:

http://labs.mwrinfosecurity.com/

Contact Me

rafael.dominguez-vega( )mwrinfosecurity!com

Page 56: Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.

56