owasp modern information gathering

31
Modern Modern information information gathering gathering Onderwerp: Datum: Aanwezigen: Classificatie: gathering gathering Modern Information Gathering 26-JUN-2012 OWASP Public

Upload: kza-bv

Post on 17-May-2015

1.292 views

Category:

Technology


4 download

DESCRIPTION

OWASP is een wereldwijde non-profit organisatie, met een Nederlandse vestiging, die onder meer richtlijnen voor beveiliging biedt. IT Security Specialist Dave van Stein van KZA heeft op 26 juni een presentatie gegeveven

TRANSCRIPT

Page 1: Owasp modern information gathering

Modern Modern informationinformationgatheringgathering

Onderwerp:

Datum:

Aanwezigen:

Classificatie:

gatheringgathering

Modern Information Gathering

26-JUN-2012

OWASP

Public

Page 2: Owasp modern information gathering

Who Am I

Dave van Stein

38 years38 years

Tester > 11 years

(Application) Security Testing

“Certified Ethical Hacker”

Page 3: Owasp modern information gathering

Agenda

Goal of the presentation

What is Information Gathering ?

Domain scanning

Search engine ‘abuse’

Other tools

Some Social EngineeringSome Social Engineering

Remedies

Conclusions

Page 4: Owasp modern information gathering

Give insight in amount of information anonymously available on internet about your system (and users)

Give insight in the amount and possibilities of tools freely available

Goal of this presentation

Identify entrypoint

Gain access

Secure access

Do stuff

Clear up the mess

Come back another time

(simplified procedure)

Page 5: Owasp modern information gathering

‘Classic’ Domain Scanning

Steps involved:Get network information with ping and traceroute

Get DNS information with WHOIS and LOOKUP

Do DNS zone transfer for subdomains

Download website for extra info

Scan serversScan servers

Problems:DNS zone transfers often not authorized

Active connection with target => detectable

Page 6: Owasp modern information gathering

Modern Information Gathering

Interesting information:

Domains and subdomains

IP adresses

Applications and technologies

Hotspots (known vulnerabilities)

Usernames and passwordsUsernames and passwords

Sensitive information

Passive

As little contact as possible with target

No direct scanning, no intrusion

No logging and no alarm triggering !

Page 7: Owasp modern information gathering

Sources of information

Public records WHOIS: information about owner

DNS : information about IP adresses

Search engines Often little restrictions on websites

Cache all information gathered

Tweaking provides additional informationTweaking provides additional information

Various websites Anonymous

Combine above techniques

Sort results for nice presentation

Advanced and Automated Specialized (offline) Tools

scanning

Page 8: Owasp modern information gathering

Shodanhq.com

Shodan

IP adresses

Server banner

X-Powered-by banner

CookiesCookies

Search filters

City, Country, Geo

Hostname, ip address / net block

Os, port

date (before / after)

ssl cert version, bits, issuer

ssl cipher support, bit support , protocol

Page 9: Owasp modern information gathering

ServerSniff.net

Server Sniff

NS reports

Domain reports

SubdomainsSubdomains

Various (trace)routes

Various ping types

Shows robots.txt

Anonymous !

Page 10: Owasp modern information gathering

Domain Scanning: Server Sniff

Page 11: Owasp modern information gathering

Robtex.com

Page 12: Owasp modern information gathering

Domain Scanning: Robtex

Domain ‘Swiss Army Knife’

Provides ALL information linked to a domain

Page 13: Owasp modern information gathering

Domain scanning: Robtex

Page 14: Owasp modern information gathering

Google Advanced search

filetype: (or ext:)Find documents of the specified type.

E.g. PDF, XLS, DOC

intext:The terms must appear in the text of the page.The terms must appear in the text of the page.

intitle:The terms must appear in the title of the page.

inurl:The terms must appear in the URL of the page.

Page 15: Owasp modern information gathering

Google Hacking Database

www.johnny.ihackstuff.com

(edit: http://johnny.ihackstuff.com/ghdb.php)

Collection of queries for

finding ‘interesting’ stuff

No longer updated

Possible results of GHD:

Identify systems in use (including version)

Identify known exploits

Locations of sensitive information

User-id’s & passwords

Logging files

Many other things

Page 16: Owasp modern information gathering

The NEW and IMPROVED GHDB

Page 17: Owasp modern information gathering

Bing.com

Finds subdomains with ‘IP:x.x.x.x’

Page 18: Owasp modern information gathering

Baidu

inurl:

intitle:

site:

Page 19: Owasp modern information gathering

Example

Page 20: Owasp modern information gathering

SearchDiggity

Page 21: Owasp modern information gathering

Stach & Liu

Page 22: Owasp modern information gathering

SEO Tools

Page 23: Owasp modern information gathering

Domain Scanning ‘on-the-fly’

Passive Recon (Firefox add-on)

Page 24: Owasp modern information gathering

FOCA

Page 25: Owasp modern information gathering

Maltego

Intelligence and forensics tool

Connects many different sources of info

Represents in graphical way

Very extensive capabilities

Page 26: Owasp modern information gathering

Maltego

Can also be used for social engineering

- Facebook & twitter

- Email adresses

- Phone numbers

- etc

Page 27: Owasp modern information gathering

theHarvester

Page 28: Owasp modern information gathering

Conclusions

What search engines see, hackers can abuse

Anonymous, online and offline, Highly automated

Many tools are freely availableMany tools are freely available

Networks can be mapped with much detail in minutes

Much information about your company, systems and users available on internet

Page 29: Owasp modern information gathering

Remedies (1/2)

Limit access • Allow search engines only to see what they need to see. • Make sure unauthorized users are not able to look into or even see files

they do not need to see. • Force possible intruders to use methods that can be scanned and

monitored.

Use the tools of hackersUse the tools of hackers• Scan your systems with the tools hackers use and check the information

that is found. • Scan for error messages and other things that reveal information about

the system and services and remove them.

Check what spiders can see• Use a spider simulator to check what spiders can see and if your

application still functions correctly.

Page 30: Owasp modern information gathering

Remedies (2/2)

Awareness • Be aware of all possible sources of information. Create awareness

among employees. Assume all information will possibly abused

Clean documents • Remove al metadata from documents before publishing. • Remove al metadata from documents before publishing.

Audit frequently• Keep your knowledge up-to-date and scan regularly for

information that can be found about your systems or hire professionals do to it for you.

Page 31: Owasp modern information gathering

Interesting books on the subject