art of backdooring: technique and practice

27
Ahmad Muammar W. K. http://google.com/search?q=y3dips

Upload: ammar-wk

Post on 18-May-2015

979 views

Category:

Technology


5 download

TRANSCRIPT

Page 1: Art of Backdooring: Technique and Practice

Ahmad Muammar W. K.http://google.com/search?q=y3dips

Page 2: Art of Backdooring: Technique and Practice

http://google.com/search?q=y3dips

BackdoorSuatu metode untuk mem-bypass otentikasi normal ataukeamanan akses secara remote ke suatu mesin (komputer)

Page 3: Art of Backdooring: Technique and Practice

Footprinting

Scanning

Enumeration

Gaining Access

Escalating Priveledge

Pilfering

Covering Tracks

Creating Backdoor

Denial OF Service

Page 4: Art of Backdooring: Technique and Practice

http://google.com/search?q=y3dips

Need a Backdoor?Tanpa otentikasi resmiAkses mesin tanpa batasan (waktu, arsitektur, dsb)E.t.c

Page 5: Art of Backdooring: Technique and Practice

http://google.com/search?q=y3dips

TypesProgram yang di install, e.g : back orifice, sshv4Modifikasi program/file, e.g : OpenSSH backdoorBerbasiskan Aplikasi (plugins), e.g : cgi-telnet, php shellProgram yang di eksekusi (binnary), e.g : bindshelletc

Page 6: Art of Backdooring: Technique and Practice

Ahmad Muammar W. K.http://google.com/search?q=y3dips

Page 7: Art of Backdooring: Technique and Practice
Page 8: Art of Backdooring: Technique and Practice
Page 9: Art of Backdooring: Technique and Practice
Page 10: Art of Backdooring: Technique and Practice
Page 11: Art of Backdooring: Technique and Practice
Page 12: Art of Backdooring: Technique and Practice
Page 13: Art of Backdooring: Technique and Practice

Ahmad Muammar W. K.http://google.com/search?q=y3dips

Page 14: Art of Backdooring: Technique and Practice

http://google.com/search?q=y3dips

SimulationPassword database/file ModificationReverse shell

Page 15: Art of Backdooring: Technique and Practice

Ahmad Muammar W. K.http://google.com/search?q=y3dips

Page 16: Art of Backdooring: Technique and Practice
Page 17: Art of Backdooring: Technique and Practice

Ahmad Muammar W. K.http://google.com/search?q=y3dips

Page 18: Art of Backdooring: Technique and Practice

http://google.com/search?q=y3dips

Salah satu teknik yang bisa digunakan untuk membypass firewall dengan full restriction inbound traffic.

Reverse Shell

Page 19: Art of Backdooring: Technique and Practice

http://google.com/search?q=y3dips

Tidak bisa install programKemampuan UserTidak bisa patching/modifikasi aplikasiTidak memberi interactive shellSemua koneksi dari dalam keluar not filtered

Why ?

Page 20: Art of Backdooring: Technique and Practice

http://google.com/search?q=y3dips

Reverse Shell

Page 21: Art of Backdooring: Technique and Practice

Firewall

Attacker

Server

Attacker membuka koneksi ke server menggunakan port 80 (HTTP)Attacker menemukan celah untuk memasang backdoor di komputer server dan menutup koneksi

Page 22: Art of Backdooring: Technique and Practice

Firewall

Attacker

Server

Attacker kembali membuka koneksi untuk mengakses server target melalui backdoor ytang ditanamkanAttacker tidak bisa mengakses backdoor via port yang di tentukan karena terbentur firewall

Page 23: Art of Backdooring: Technique and Practice

Firewall

Attacker

Server

Attacker membuka kembali koneksi ke server menggunakan port 80 (HTTP)Attacker menemukan celah untuk memasang reverse shell backdoor di komputer server

Page 24: Art of Backdooring: Technique and Practice

Firewall

Attacker

Server

Attacker membuka koneksi di mesinnya ( e.g menggunakan netcat )Attacker mengeksekusi revershe shell backdoor di mesin targetKoneksi terjadi☺

Page 25: Art of Backdooring: Technique and Practice
Page 26: Art of Backdooring: Technique and Practice

http://google.com/search?q=y3dips

Reverse ShellBackdoor tidak selalu online !Pengaktifannya bisa melalui backdoor lain di web applikasiMinimalisir kecurigaan Tuan RumahPhpShell, cgi-telnet, remote command execution

Page 27: Art of Backdooring: Technique and Practice

Ahmad Muammar W. K.http://google.com/search?q=y3dips