0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
115 visualizzazioni17 pagine
Attack vector is the way / path that a hacker uses to gain access to a server / computer or other resource in order to obtain information, deliver a payload or some other malicious outcome. A social engineering attack is the typical entry point when "attacking" the human factor. Attack vector 2 - entry point Technological If the receptionist did not have a facebook account how could we get access to the machine?
Attack vector is the way / path that a hacker uses to gain access to a server / computer or other resource in order to obtain information, deliver a payload or some other malicious outcome. A social engineering attack is the typical entry point when "attacking" the human factor. Attack vector 2 - entry point Technological If the receptionist did not have a facebook account how could we get access to the machine?
Copyright:
Attribution Non-Commercial (BY-NC)
Formati disponibili
Scarica in formato PPTX, PDF, TXT o leggi online su Scribd
Attack vector is the way / path that a hacker uses to gain access to a server / computer or other resource in order to obtain information, deliver a payload or some other malicious outcome. A social engineering attack is the typical entry point when "attacking" the human factor. Attack vector 2 - entry point Technological If the receptionist did not have a facebook account how could we get access to the machine?
Copyright:
Attribution Non-Commercial (BY-NC)
Formati disponibili
Scarica in formato PPTX, PDF, TXT o leggi online su Scribd
Chaining attacks, combining techniques to reach the endpoint. Advanced Penetration Testing The use of human factor when doing a pentest/security test
Tiago Henriques – Office D103C – Research room
MSc by Research Information Security and Computer Forensics Synopsis
What is an attack vector
Different Examples of attack vectors
Tools
Combining attacks
Conclusion Who Am I?
Tiago Henriques
Student
BSc Software Engineering
Studying MSc by Research Information
Security and Computer Forensics Infosec lover Attack Vector
An attack vector is the way/path that a hacker
uses to gain access to a server/computer or other resource in order to obtain information, deliver a payload or some other malicious outcome. Attack Vectors
Attack Vectors come in many ways:
Network attacks – Man in middle, arp poisoning, sniffing attacks, wireless attack Viruses, Trojans, Malware DELIVERY Email Social Engineer attack Physical attacks Scenario
Network has multiple servers and
workstations connected to it Network has an access point protected by WEP Multiple users some ranging from average IT knowledge helpdesk to System administrators with Expert skills Several operating systems: Linux, Windows, OS X Attack vector 1 – Entry point
The entry point it’s the first step the hacker
will use to get some sort of interaction with one of the participants in the system being targeted, these can be users, computers, etc. Attack vector 1 – Entry point
If the hacker chose as an entry point the
human factor? A social engineering attack is the typical entry point when “attacking” the human factor, then it will pass into a technological vector point. Attack vector 1 – Entry point Human The first step, reconnaissance! The hacker could get information about the receptionist, by getting her email address he could reach for example her facebook page, where he could see that she is a big fan of Metallica. To any other person this could be useless information, but where a normal person sees no harm in information a hacker sees an attack vector Attack vector 1 – Entry point Technological If the receptionist was smart and did not have a facebook account (!!rare case!!) how could we get access to a machine ?
Multiple attacks could be used to get critical
information about the network Attack vector 1 – Entry point Technological DNS Attack – Look up DNS information and check if their servers are vulnerable to a remote transfer attack. This will disclosure a lot of network information which could lead to other attack vectors Wireless attack – As explained on our scenario we have a wireless access point protected by WEP. As you should all now, WEP is easily hackable. Though even if it was protected by WPA – we could chain 2 attacks (Social attack on the Network administrator, create keyword list based on everything related to his life such as favorite hobbies, music, bands, daughter/son name, wife name) and make a brute force attack. Other keywords related to the company could also be used, such as the name of the company or products it sells ( this information is usually available on the company website). Attack vector 2 – Taking control
In this part we will discuss how a hacker
would exploit a computer within the system to start taking control and getting the information he is trying to access. Attack vector 2 – Entry point Human + Email attack + PDF Exploitation – Demo attack
In this demo that you are about to see, a tool
named SET is used to create a a template email, in which we will pretend to be the company CFO, as people tend to open an email straight way when it comes from the boss. The more information you obtain the better result you will get
The email will contain a pdf, which inside has code
that will exploit an error in adobe reader and allow the hacker to take control over the computer as soon as the user opens the pdf. Attack vector 2 – Entry point Technological + Web Page Forgery + Java Exploit + ARP Poisoning - DEMO
In this case we will combine multiple attacks,
we will first crack the WEP password on the access point then, we will use SET to create a forged website and then deliver a payload based on the Java exploit which spoofs a Java certificate and delivers a metasploit payload instead. We will then use ettercap to redirect users into our page, by doing an ARP poisoning attack on the network. Conclusion
There are many ways to defend a system, but
there are also many ways to attack it A key skill to have while testing a systems security is “imagination”, being able to think “outside the box”. The human factor is a very important one, with lots of flaws and should always be used when possible. Kudos